Cryptology ePrint Archive: Listing for 2017
Regex
2017/1262 (PDF ) A New Index Calculus Algorithm for the Elliptic Curve Discrete Logarithm Problem and Summation Polynomial Evaluation Gary McGuire, Daniela Mueller
2017/1261 (PDF ) A Comprehensive Performance Analysis of Hardware Implementations of CAESAR Candidates Sachin Kumar, Jawad Haj-Yahya, Mustafa Khairallah, Mahmoud A. Elmohr, Anupam Chattopadhyay
2017/1260 (PDF ) Collision Resistant Hashing from Sub-exponential Learning Parity with Noise Yu Yu, Jiang Zhang, Jian Weng, Chun Guo, Xiangxue Li
2017/1259 (PDF ) Cryptanalysis of HK17 Haoyu Li, Renzhang Liu, Yanbin Pan, Tianyuan Xie
2017/1258 (PDF ) Remarks on Quaternions/Octonion Based Diffie-Hellman Key Exchange Protocol Submitted to NIST PQC Project Yongge Wang, Qutaibah m. Malluhi
2017/1257 (PDF ) A first-order chosen-plaintext DPA attack on the third round of DES Oscar Reparaz, Benedikt Gierlichs
2017/1256 (PDF ) A Universally Composable Treatment of Network Time Ran Canetti, Kyle Hogan, Aanchal Malhotra, Mayank Varia
2017/1255 (PDF ) On the Strategy and Behavior of Bitcoin Mining with N-attackers Hanqing Liu, Na Ruan, Rongtian Du, Weijia Jia
2017/1254 (PDF ) Practical Applications of Improved Gaussian Sampling for Trapdoor Lattices Kamil Doruk Gür, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan, Hadi Sajjadpour, Erkay Savaş
2017/1253 (PDF ) Micro-Architectural Power Simulator for Leakage Assessment of Cryptographic Software on ARM Cortex-M3 Processors Yann Le Corre, Johann Großschädl, Daniel Dinu
2017/1252 (PDF ) Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids Jacqueline Brendel, Marc Fischlin, Felix Günther
2017/1251 (PDF ) A toolbox for software optimization of QC-MDPC code-based cryptosystems Nir Drucker, Shay Gueron
2017/1250 (PDF ) Non-Interactive Delegation for Low-Space Non-Deterministic Computation Saikrishna Badrinarayanan, Yael Tauman Kalai, Dakshita Khurana, Amit Sahai, Daniel Wichs
2017/1249 (PDF ) Quantum cryptanalysis on some Generalized Feistel Schemes Xiaoyang Dong, Zheng Li, Xiaoyun Wang
2017/1248 (PDF ) Foundations of Homomorphic Secret Sharing Elette Boyle, Niv Gilboa, Yuval Ishai, Huijia Lin, Stefano Tessaro
2017/1247 (PDF ) Block encryption of quantum messages Min Liang, Li Yang
2017/1246 (PDF ) Verification of FPGA-augmented trusted computing mechanisms based on Applied Pi Calculus Alessandro Cilardo, Andrea Primativo
2017/1245 (PDF ) IntegriKey: End-to-End Integrity Protection of User Input Aritra Dhar, Der-Yeuan Yu, Kari Kostiainen, Srdjan Capkun
2017/1244 (PDF ) Corrections to ''Further Improving Efficiency of Higher-Order Masking Schemes by Decreasing Randomness Complexity'' Shuang Qiu, Rui Zhang, Yongbin Zhou, Wei Cheng
2017/1243 (PDF ) Augmented Black-Box Simulation and Zero Knowledge Argument for NP Li Hongda, Pan Dongxue, Ni Peifang
2017/1242 (PDF ) Designing Proof of Transaction Puzzles for Cryptocurrency Taotao Li, Parhat Abla, Mingsheng Wang, Qianwen Wei
2017/1241 (PDF ) A Public-key Encryption Scheme Based on Non-linear Indeterminate Equations (Giophantus) Koichiro Akiyama, Yasuhiro Goto, Shinya Okumura, Tsuyoshi Takagi, Koji Nuida, Goichiro Hanaoka, Hideo Shimizu, Yasuhiko Ikematsu
2017/1240 (PDF ) UWB with Pulse Reordering: Securing Ranging against Relay and Physical-Layer Attacks Mridula Singh, Patrick Leu, Srdjan Capkun
2017/1239 (PDF ) An Efficient NIZK Scheme for Privacy-Preserving Transactions over Account-Model Blockchain Shunli Ma, Yi Deng, Debiao He, Jiang Zhang, Xiang Xie
2017/1238 (PDF ) Efficient Oblivious Data Structures for Database Services on the Cloud Thang Hoang, Ceyhun D. Ozkaptan, Gabriel Hackebeil, Attila A. Yavuz
2017/1237 (PDF ) A High-Security Searchable Encryption Framework for Privacy-Critical Cloud Storage Services Thang Hoang, Attila A. Yavuz, Jorge Guajardo
2017/1236 (PDF ) Fast Quantum Algorithm for Solving Multivariate Quadratic Equations Jean-Charles Faugère, Kelsey Horan, Delaram Kahrobaei, Marc Kaplan, Elham Kashefi, Ludovic Perret
2017/1235 (PDF ) Practical Quantum-Safe Voting from Lattices Rafaël del Pino, Vadim Lyubashevsky, Gregory Neven, Gregor Seiler
2017/1234 (PDF ) High-Precision Privacy-Preserving Real-Valued Function Evaluation Christina Boura, Ilaria Chillotti, Nicolas Gama, Dimitar Jetchev, Stanislav Peceny, Alexander Petric
2017/1233 (PDF ) Provably secure compilation of side-channel countermeasures Gilles Barthe, Benjamin Grégoire, Vincent Laporte
2017/1232 (PDF ) Optimal Linear Secret Sharing Schemes for Graph Access Structures on Six Participants Motahhareh Gharahi, Shahram Khazaei
2017/1231 (PDF ) Integer Reconstruction Public-Key Encryption Houda Ferradi, David Naccache
2017/1230 (PDF ) Overdrive: Making SPDZ Great Again Marcel Keller, Valerio Pastro, Dragos Rotaru
2017/1229 (PDF ) Quantum Demiric-Selçuk Meet-in-the-Middle Attacks: Applications to 6-Round Generic Feistel Constructions Akinori Hosoyamada, Yu Sasaki
2017/1228 (PDF ) Speed-ups and time-memory trade-offs for tuple lattice sieving Gottfried Herold, Elena Kirshanova, Thijs Laarhoven
2017/1227 (PDF ) VerMI: Verification Tool for Masked Implementations Victor Arribas, Svetla Nikova, Vincent Rijmen
2017/1226 (PDF ) New (and Old) Proof Systems for Lattice Problems Navid Alamati, Chris Peikert, Noah Stephens-Davidowitz
2017/1225 (PDF ) Fast Garbling of Circuits over 3-Valued Logic Yehuda Lindell, Avishay Yanai
2017/1224 (PDF ) Practical Cryptanalysis of a Public-key Encryption Scheme Based on Non-linear Indeterminate Equations at SAC 2017 Keita Xagawa
2017/1223 (PDF ) Generic Low-Latency Masking in Hardware Hannes Gross, Rinat Iusupov, Roderick Bloem
2017/1222 (PDF ) Forward-Private Dynamic Searchable Symmetric Encryption with Efficient Search Muslum Ozgur Ozmen, Thang Hoang, Attila A. Yavuz
2017/1221 (PDF ) Weak-Unforgeable Tags for Secure Supply Chain Management Marten van Dijk, Chenglu Jin, Hoda Maleki, Phuong Ha Nguyen, Reza Rahaeimehr
2017/1220 (PDF ) Off-line Digital Cash Schemes Providing Unlinkability, Anonymity and Change Lynn Batten, Xun Yi
2017/1219 (PDF ) Correlations Between (Nonlinear) Combiners of Input and Output of Random Functions and Permutations Subhabrata Samajder, Palash Sarkar
2017/1218 (PDF ) TERMinator Suite: Benchmarking Privacy-Preserving Architectures Dimitris Mouris, Nektarios Georgios Tsoutsos, Michail Maniatakos
2017/1217 (PDF ) Linear Regression Side Channel Attack Applied on Constant XOR Shan Fu, Zongyue Wang, Fanxing Wei, Guoai Xu, An Wang
2017/1216 (PDF ) Probabilistic and Considerate Attestation of IoT Devices against Roving Malware Xavier Carpent, Norrathep Rattanavipanon, Gene Tsudik
2017/1215 (PDF ) Lattice-Based Public Key Searchable Encryption from Experimental Perspectives Rouzbeh Behnia, Muslum Ozgur Ozmen, Attila A. Yavuz
2017/1214 (PDF ) HILA5 Pindakaas: On the CCA security of lattice-based encryption with error correction Daniel J. Bernstein, Leon Groot Bruinderink, Tanja Lange, Lorenz Panny
2017/1213 (PDF ) On hybrid SIDH schemes using Edwards and Montgomery curve arithmetic Michael Meyer, Steffen Reith, Fabio Campos
2017/1212 (PDF ) A New Crypto-Classifier Service for Energy Efficiency in Smart Cities Oana Stan, Mohamed-Haykel Zayani, Renaud Sirdey, Amira Ben Hamida, Alessandro Ferreira Leite, Mallek Mziou-Sallami
2017/1211 (PDF ) Zero-Sum Partitions of PHOTON Permutations Qingju Wang, Lorenzo Grassi, Christian Rechberger
2017/1210 (PDF ) Two-Face: New Public Key Multivariate Schemes Gilles Macario-Rat, Jacques Patarin
2017/1209 (PDF ) Improvements for Finding Impossible Differentials of Block Cipher Structures Yiyuan Luo, Xuejia Lai
2017/1208 (PDF ) Security notions for cloud storage and deduplication Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani, Håvard Raddum
2017/1207 (PDF ) Unconditionally secure multi-party quantum commitment scheme Mingqiang Wang, Xue Wang, Tao Zhan
2017/1206 (PDF ) Asymptotically faster quantum algorithms to solve multivariate quadratic equations Daniel J. Bernstein, Bo-Yin Yang
2017/1205 (PDF ) Connecting Legendre with Kummer and Edwards Sabyasachi Karati, Palash Sarkar
2017/1204 (PDF ) Horizontal Clustering Side-Channel Attacks on Embedded ECC Implementations (Extended Version) Erick Nascimento, Lukasz Chmielewski
2017/1203 (PDF ) Short Double- and N-Times-Authentication-Preventing Signatures from ECDSA and More David Derler, Sebastian Ramacher, Daniel Slamanig
2017/1202 (PDF ) Faster Cryptographic Hash Function From Supersingular Isogeny Graphs Javad Doliskani, Geovandro C. C. F. Pereira, Paulo S. L. M. Barreto
2017/1201 (PDF ) Collusion Resistant Watermarking Schemes for Cryptographic Functionalities Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu
2017/1200 (PDF ) MixColumns Properties and Attacks on (round-reduced) AES with a Single Secret S-Box Lorenzo Grassi
2017/1199 (PDF ) Quantum Key-recovery Attack on Feistel Structures Xiaoyang Dong, Xiaoyun Wang
2017/1198 (PDF ) Computing isogenies between Montgomery curves using the action of (0,0) Joost Renes
2017/1197 (PDF ) Reassessing Security of Randomizable Signatures David Pointcheval, Olivier Sanders
2017/1196 (PDF ) Post-Quantum Secure Remote Password Protocol from RLWE Problem Xinwei Gao, Jintai Ding, Jiqiang Liu, Lin Li
2017/1195 (PDF ) CAPA: The Spirit of Beaver against Physical Attacks Oscar Reparaz, Lauren De Meyer, Begül Bilgin, Victor Arribas, Svetla Nikova, Ventzislav Nikov, Nigel Smart
2017/1194 (PDF ) Improved Differential Cryptanalysis on Generalized Feistel Schemes Ivan Tjuawinata, Tao Huang, Hongjun Wu
2017/1193 (PDF ) Rhythmic Keccak: SCA Security and Low Latency in HW Victor Arribas, Begül Bilgin, George Petrides, Svetla Nikova, Vincent Rijmen
2017/1192 (PDF ) Efficient Implementation of Password-Based Authenticated Key Exchange from RLWE and Post-Quantum TLS Xinwei Gao, Jintai Ding, Lin Li, Saraswathy RV, Jiqiang Liu
2017/1191 (PDF ) Data Is a Stream: Security of Stream-Based Channels Marc Fischlin, Felix Günther, Giorgia Azzurra Marson, Kenneth G. Paterson
2017/1190 (PDF ) EPIC: Efficient Private Image Classification (or: Learning from the Masters) Eleftheria Makri, Dragos Rotaru, Nigel P. Smart, Frederik Vercauteren
2017/1189 (PDF ) Return Of Bleichenbacher's Oracle Threat (ROBOT) Hanno Böck, Juraj Somorovsky, Craig Young
2017/1188 (PDF ) Signature Schemes with a Fuzzy Private Key Kenta Takahashi, Takahiro Matsuda, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki
2017/1187 (PDF ) On the Round Complexity of OT Extension Sanjam Garg, Mohammad Mahmoody, Daniel Masny, Izaak Meckler
2017/1186 (PDF ) On Multiparty Garbling of Arithmetic Circuits Aner Ben-Efraim
2017/1185 (PDF ) Complete Attack on RLWE Key Exchange with reused keys, without Signal Leakage Jintai Ding, Scott Fluhrer, Saraswathy RV
2017/1184 (PDF ) EFLASH: A New Multivariate Encryption Scheme Ryann Cartor, Daniel Smith-Tone
2017/1183 (PDF ) Round2: KEM and PKE based on GLWR Hayo Baan, Sauvik Bhattacharya, Oscar Garcia-Morchon, Ronald Rietman, Ludo Tolhuizen, Jose-Luis Torre-Arce, Zhenfei Zhang
2017/1182 (PDF ) Distributed Algorithms Made Secure: A Graph Theoretic Approach Merav Parter, Eylon Yogev
2017/1181 (PDF ) Implementing Joux-Vitse's Crossbred Algorithm for Solving MQ Systems over GF(2) on GPUs Ruben Niederhagen, Kai-Chun Ning, Bo-Yin Yang
2017/1180 (PDF ) FPGA-based Niederreiter Cryptosystem using Binary Goppa Codes Wen Wang, Jakub Szefer, Ruben Niederhagen
2017/1179 (PDF ) On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials Claude Carlet, Stjepan Picek
2017/1178 (PDF ) Comparison analysis and efficient implementation of reconciliation-based RLWE key exchange protocol Xinwei Gao, Jintai Ding, Saraswathy RV, Lin Li, Jiqiang Liu
2017/1177 (PDF ) Reusable Authentication from the Iris Benjamin Fuller, Sailesh Simhadri, James Steel
2017/1176 (PDF ) Cyclic Locking and Memristor-based Obfuscation Against CycSAT and Inside Foundry Attacks Amin Rezaei, Yuanqi Shen, Shuyu Kong, Jie Gu, Hai Zhou
2017/1175 (PDF ) Short Solutions to Nonlinear Systems of Equations Alan Szepieniec, Bart Preneel
2017/1174 (PDF ) Efficient Optimal Ate Pairing at 128-bit Security Level Md. Al-Amin Khandaker, Yuki Nanjo, Loubna Ghammam, Sylvain Duquesne, Yasuyuki Nogami, Yuta Kodera
2017/1173 (PDF ) Fully Verifiable Secure Delegation of Pairing Computation: Cryptanalysis and An Efficient Construction Osmanbey Uzunkol, Öznur Kalkar, İsa Sertkaya
2017/1172 (PDF ) A Note on Stream Ciphers that Continuously Use the IV Matthias Hamann, Matthias Krause, Willi Meier
2017/1171 (PDF ) Attacks on the AJPS Mersenne-based cryptosystem Koen de Boer, Léo Ducas, Stacey Jeffery, Ronald de Wolf
2017/1170 (PDF ) SAT-based Bit-flipping Attack on Logic Encryptions Yuanqi Shen, Amin Rezaei, Hai Zhou
2017/1169 (PDF ) There Goes Your PIN: Exploiting Smartphone Sensor Fusion Under Single and Cross User Setting David Berend, Bernhard Jungk, Shivam Bhasin
2017/1168 (PDF ) Itsuku: a Memory-Hardened Proof-of-Work Scheme Fabien Coelho, Arnaud Larroche, Baptiste Colin
2017/1167 (PDF ) Cryptocurrency Voting Games Sanjay Bhattacherjee, Palash Sarkar
2017/1166 (PDF ) SCADPA: Side-Channel Assisted Differential-Plaintext Attack on Bit Permutation Based Ciphers Jakub Breier, Dirmanto Jap, Shivam Bhasin
2017/1165 (PDF ) Fast and Universally-Composable Oblivious Transfer and Commitment Scheme with Adaptive Security Megha Byali, Arpita Patra, Divya Ravi, Pratik Sarkar
2017/1164 (PDF ) Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications M. Sadegh Riazi, Christian Weinert, Oleksandr Tkachenko, Ebrahim M. Songhori, Thomas Schneider, Farinaz Koushanfar
2017/1163 (PDF ) MILP-aided Cryptanalysis of Round Reduced ChaCha Najwa Aaraj, Florian Caullery, Marc Manzano
2017/1162 (PDF ) Kayawood, a Key Agreement Protocol Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E Gunnells
2017/1161 (PDF ) A Review of Existing 4-bit Crypto S-box cryptanalysis Techniques and Two New Techniques with 4-bit Boolean Functions for Cryptanalysis of 4-bit Crypto S-boxes. Sankhanil Dey, Ranjan Ghosh
2017/1160 (PDF ) A Practical Cryptanalysis of WalnutDSA Daniel Hart, DoHoon Kim, Giacomo Micheli, Guillermo Pascual Perez, Christophe Petit, Yuxuan Quek
2017/1159 (PDF ) Cryptanalysis of indistinguishability obfuscation using GGH13 without ideals Gu Chunsheng
2017/1158 (PDF ) Oblivious Dynamic Searchable Encryption via Distributed PIR and ORAM Thang Hoang, Attila A. Yavuz, Betul F. Durak, Jorge Guajardo
2017/1157 (PDF ) ARM2GC: Succinct Garbled Processor for Secure Computation Ebrahim M Songhori, M Sadegh Riazi, Siam U Hussain, Ahmad-Reza Sadeghi, Farinaz Koushanfar
2017/1156 (PDF ) Two-Round Multiparty Secure Computation from Minimal Assumptions Sanjam Garg, Akshayaram Srinivasan
2017/1155 (PDF ) A Survey and Refinement of Repairable Threshold Schemes Thalia M. Laing, Douglas R. Stinson
2017/1154 (PDF ) Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications to Ring Signatures from Symmetric-Key Primitives David Derler, Sebastian Ramacher, Daniel Slamanig
2017/1153 (PDF ) Tesseract: Real-Time Cryptocurrency Exchange using Trusted Hardware Iddo Bentov, Yan Ji, Fan Zhang, Yunqi Li, Xueyuan Zhao, Lorenz Breidenbach, Philip Daian, Ari Juels
2017/1152 (PDF ) Symbolic Security Criteria for Blockwise Adaptive Secure Modes of Encryption Catherine Meadows
2017/1151 (PDF ) Shorter Linear Straight-Line Programs for MDS Matrices Thorsten Kranz, Gregor Leander, Ko Stoffelen, Friedrich Wiemer
2017/1150 (PDF ) SWiM: Secure Wildcard Pattern Matching From OT Extension Vladimir Kolesnikov, Mike Rosulek, Ni Trieu
2017/1149 (PDF ) Improved Cryptanalysis of HFEv- via Projection Jintai Ding, Ray Perlner, Albrecht Petzoldt, Daniel Smith-Tone
2017/1148 (PDF ) Improvements to the Linear Operations of LowMC: A Faster Picnic Daniel Kales, Léo Perrin, Angela Promitzer, Sebastian Ramacher, Christian Rechberger
2017/1147 (PDF ) Under Pressure: Security of Caesar Candidates beyond their Guarantees Serge Vaudenay, Damian Vizár
2017/1146 (PDF ) A Zero-Knowledge Version of vSQL Yupeng Zhang, Daniel Genkin, Jonathan Katz, Dimitrios Papadopoulos, Charalampos Papamanthou
2017/1145 (PDF ) vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases Yupeng Zhang, Daniel Genkin, Jonathan Katz, Dimitrios Papadopoulos, Charalampos Papamanthou
2017/1144 (PDF ) How Far Can We Reach? Breaking Masked AES Smartcard Implementation Using One Trace Wei Cheng, Chao Zheng, Yuchen Cao, Yongbin Zhou, Hailong Zhang, Sylvain Guilley, Laurent Sauvage
2017/1143 (PDF ) Faster key compression for isogeny-based cryptosystems Gustavo H. M. Zanon, Marcos A. Simplicio Jr, Geovandro C. C. F. Pereira, Javad Doliskani, Paulo S. L. M. Barreto
2017/1142 (PDF ) PIR with compressed queries and amortized query processing Sebastian Angel, Hao Chen, Kim Laine, Srinath Setty
2017/1141 (PDF ) Cryptanalysis of Bivium using a Boolean all solution solver Virendra Sule, Anmol Yadav
2017/1140 (PDF ) Lattice Klepto: Turning Post-Quantum Crypto Against Itself Robin Kwant, Tanja Lange, Kimberley Thissen
2017/1139 (PDF ) Decoding Linear Codes with High Error Rate and its Impact for LPN Security Leif Both, Alexander May
2017/1138 (PDF ) The Parallel Repetition of Non-Signaling Games: Counterexamples and Dichotomy Justin Holmgren, Lisa Yang
2017/1137 (PDF ) Note on the Robustness of CAESAR Candidates Daniel Kales, Maria Eichlseder, Florian Mendel
2017/1136 (PDF ) Clustering Related-Tweak Characteristics: Application to MANTIS-6 Maria Eichlseder, Daniel Kales
2017/1135 (PDF ) On the Complexity of the Hybrid Approach on HFEv- Albrecht Petzoldt
2017/1134 (PDF ) Machine-Learning Attacks on PolyPUFs, OB-PUFs, RPUFs, LHS-PUFs, and PUF–FSMs Jeroen Delvaux
2017/1133 (PDF ) Sentiment Protocol: A Decentralized Protocol Leveraging Crowd Sourced Wisdom Anton Muehlemann
2017/1132 (PDF ) Doubly-efficient zkSNARKs without trusted setup Riad S. Wahby, Ioanna Tzialla, abhi shelat, Justin Thaler, Michael Walfish
2017/1131 (PDF ) A Certain Family of Subgroups of $\mathbb Z_n^\star$ Is Weakly Pseudo-Free under the General Integer Factoring Intractability Assumption Mikhail Anokhin
2017/1130 (PDF ) Information-Theoretic Secret-Key Agreement: The Asymptotically Tight Relation Between the Secret-Key Rate and the Channel Quality Ratio Daniel Jost, Ueli Maurer, Joao L. Ribeiro
2017/1129 (PDF ) Probabilistic solution of Yao's millionaires' problem Mariya Bessonov, Dima Grigoriev, Vladimir Shpilrain
2017/1128 (PDF ) Forward Secure Efficient Group Signature in Dynamic Setting using Lattices Meenakshi Kansal, Ratna Dutta, Sourav Mukhopadhyay
2017/1127 (PDF ) On the Leakage Resilience of Ring-LWE Based Public Key Encryption Dana Dachman-Soled, Huijing Gong, Mukul Kulkarni, Aria Shahverdi
2017/1126 (PDF ) Privacy Games for Syntactic Privacy Notions Robin Ankele, Andrew Simpson
2017/1125 (PDF ) k-Round MPC from k-Round OT via Garbled Interactive Circuits Fabrice Benhamouda, Huijia Lin
2017/1124 (PDF ) A formal model of Bitcoin transactions Nicola Atzei, Massimo Bartoletti, Stefano Lande, Roberto Zunino
2017/1123 (PDF ) Relaxed Lattice-Based Signatures with Short Zero-Knowledge Proofs Cecilia Boschini, Jan Camenisch, Gregory Neven
2017/1122 (PDF ) On post-processing in the quantum algorithm for computing short discrete logarithms Martin Ekerå
2017/1121 (PDF ) Differential Attacks on LILLIPUT Cipher Valérie Nachef, Nicolas Marrière, Emmanuel Volte
2017/1120 (PDF ) A Ciphertext-Size Lower Bound for Order-Preserving Encryption with Limited Leakage David Cash, Cong Zhang
2017/1119 (PDF ) Detection of cryptographic algorithms with grap Léonard Benedetti, Aurélien Thierry, Julien Francq
2017/1118 (PDF ) Solida: A Blockchain Protocol Based on Reconfigurable Byzantine Consensus Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren, Alexander Spiegelman
2017/1117 (PDF ) Risky Traitor Tracing and New Differential Privacy Negative Results Rishab Goyal, Venkata Koppula, Andrew Russell, Brent Waters
2017/1116 (PDF ) A Constant-Size Signature Scheme with a Tighter Reduction from the CDH Assumption Kaisei Kajita, Kazuto Ogawa, Eiichiro Fujisaki
2017/1115 (PDF ) Hardware Aspects of Montgomery Modular Multiplication Colin D. Walter
2017/1114 (PDF ) Fast Homomorphic Evaluation of Deep Discretized Neural Networks Florian Bourse, Michele Minelli, Matthias Minihold, Pascal Paillier
2017/1113 (PDF ) The Discrete-Logarithm Problem with Preprocessing Henry Corrigan-Gibbs, Dmitry Kogan
2017/1112 (PDF ) Manifold Learning Towards Masking Implementations: A First Study Changhai Ou, Degang Sun, Zhu Wang, Xinping Zhou, Wei Cheng
2017/1111 (PDF ) Fuzzy Password-Authenticated Key Exchange Pierre-Alain Dupont, Julia Hesse, David Pointcheval, Leonid Reyzin, Sophia Yakoubov
2017/1110 (PDF ) A Systematic Evaluation of Profiling Through Focused Feature Selection Stjepan Picek, Annelie Heuser, Alan Jovic, Lejla Batina
2017/1109 (PDF ) EzPC: Programmable, Efficient, and Scalable Secure Two-Party Computation for Machine Learning Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma, Shardul Tripathi
2017/1108 (PDF ) Cryptographic Pairings Kristin Lauter, Michael Naehrig
2017/1107 (PDF ) Hardness of Non-Interactive Differential Privacy from One-Way Functions Lucas Kowalczyk, Tal Malkin, Jonathan Ullman, Daniel Wichs
2017/1106 (PDF ) Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System (Full Version) Weijin Wang, Yu Qin, Jingbin Liu, Dengguo Feng
2017/1105 (PDF ) FFSSE: Flexible Forward Secure Searchable Encryption with Efficient Performance Zheli Liu, Siyi Lv, Yu Wei, Jin Li, Joseph K. Liu, Yang Xiang
2017/1104 (PDF ) Efficient provable-secure NTRUEncrypt over any cyclotomic field Yang Wang, Mingqiang Wang
2017/1103 (PDF ) A new chosen IV statistical distinguishing framework to attack symmetric ciphers, and its application to ACORN-v3 and Grain-128a Vahid Amin Ghafari, Honggang Hu
2017/1102 (PDF ) ID-HABE: Incorporating ID-based Revocation, Delegation, and Authority Hierarchy into Attribute-Based Encryption Qiuxiang Dong, Dijiang Huang, Jim Luo, Myong Kang
2017/1101 (PDF ) HIR-CP-ABE: Hierarchical Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Secure and Flexible Data Sharing Qiuxiang Dong, Dijiang Huang, Jim Luo, Myong Kang
2017/1100 (PDF ) IR-CP-ABE: Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Flexible Secure Group-Based Communication Weijia Wang, Zhijie Wang, Bing Li, Qiuxiang Dong, Dijiang Huang
2017/1099 (PDF ) Security Analysis of a Dynamic Threshold Secret Sharing Scheme Using Linear Subspace Method Sadegh Jamshidpour, Zahra Ahmadian
2017/1098 (PDF ) The Strength of Weak Randomization: Efficiently Searchable Encryption with Minimal Leakage David Pouliot, Scott Griffy, Charles V. Wright
2017/1097 (PDF ) Non-malleable Randomness Encoders and their Applications Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar
2017/1096 (PDF ) IND-CCA-secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited Haodong Jiang, Zhenfeng Zhang, Long Chen, Hong Wang, Zhi Ma
2017/1095 (PDF ) Analysis of the Bitcoin UTXO set Sergi Delgado-Segura, Cristina Pérez-Solà, Guillermo Navarro-Arribas, Jordi Herrera-Joancomartí
2017/1094 (PDF ) Privately Constraining and Programming PRFs, the LWE Way Chris Peikert, Sina Shiehian
2017/1093 (PDF ) Proposal for Protocol on a Quorum Blockchain with Zero Knowledge Thomas Espel, Laurent Katz, Guillaume Robin
2017/1092 (PDF ) Universally Composable Secure Computation with Corrupted Tokens Nishanth Chandran, Wutichai Chongchitmate, Rafail Ostrovsky, Ivan Visconti
2017/1091 (PDF ) Fairness in an Unfair World: Fair Multiparty Computation from public Bulletin Boards Arka Rai Choudhuri, Matthew Green, Abhishek Jain, Gabriel Kaptchuk, Ian Miers
2017/1090 (PDF ) Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts Lorenz Breidenbach, Philip Daian, Florian Tramèr, Ari Juels
2017/1089 (PDF ) Secure Deduplication of Encrypted Data: Refined Model and New Constructions Jian Liu, Li Duan, Yong Li, N. Asokan
2017/1088 (PDF ) Promise Zero Knowledge and its Applications to Round Optimal MPC Saikrishna Badrinarayanan, Vipul Goyal, Abhishek Jain, Yael Tauman Kalai, Dakshita Khurana, Amit Sahai
2017/1087 (PDF ) General purpose integer factoring Arjen K. Lenstra
2017/1086 (PDF ) Order-Revealing Encryption: File-Injection Attack and Forward Security Xingchen Wang, Yunlei Zhao
2017/1085 (PDF ) Improving Side-channel Analysis through Semi-supervised Learning Stjepan Picek, Annelie Heuser, Alan Jovic, Karlo Knezevic, Tania Richmond
2017/1084 (PDF ) Lightweight MDS Serial-type Matrices with Minimal Fixed XOR Count (Full version) Dylan Toh, Jacob Teo, Khoongming Khoo, Siang Meng Sim
2017/1083 (PDF ) CAMFAS: A Compiler Approach to Mitigate Fault Attacks via Enhanced SIMDization Zhi Chen, Junjie Shen, Alex Nicolau, Alex Veidenbaum, Nahid Farhady Ghalaty, Rosario Cammarota
2017/1082 (PDF ) Instruction Duplication: Leaky and Not Too Fault-Tolerant! Lucian Cojocar, Kostas Papagiannopoulos, Niek Timmers
2017/1081 (PDF ) The Montgomery and Joye Powering Ladders are Dual Colin D. Walter
2017/1080 (PDF ) Quantum Lightning Never Strikes the Same State Twice Mark Zhandry
2017/1079 (PDF ) Entropy Reduction for the Correlation-Enhanced Power Analysis Collision Attack Andreas Wiemers, Dominik Klein
2017/1078 (PDF ) The Tao of Inference in Privacy-Protected Databases Vincent Bindschaedler, Paul Grubbs, David Cash, Thomas Ristenpart, Vitaly Shmatikov
2017/1077 (PDF ) A New Generalization of the KMOV Cryptosystem Maher Boudabra, Abderrahmane Nitaj
2017/1076 (PDF ) A generalized attack on RSA type cryptosystems Martin Bunder, Abderrahmane Nitaj, Willy Susilo, Joseph Tonien
2017/1075 (PDF ) XHX - A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing Ashwin Jha, Eik List, Kazuhiko Minematsu, Sweta Mishra, Mridul Nandi
2017/1074 (PDF ) A Practical Fault Attack on ARX-like Ciphers with a Case Study on ChaCha20 S V Dilip Kumar, Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay, Shivam Bhasin, Anupam Chattopadhyay, Anubhab Baksi
2017/1073 (PDF ) One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-like Block Ciphers Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay, Shivam Bhasin
2017/1072 (PDF ) Settling the mystery of $Z_r=r$ in RC4 Sabyasachi Dey, Santanu Sarkar
2017/1071 (PDF ) Meet-in-the-Middle Attacks on 3-Line Generalized Feistel Networks Le Dong, Yongxia Mao
2017/1070 (PDF ) The Transaction Graph for Modeling Blockchain Semantics Christian Cachin, Angelo De Caro, Pedro Moreno-Sanchez, Björn Tackmann, Marko Vukolić
2017/1069 (PDF ) Non-Malleability vs. CCA-Security: The Case of Commitments Brandon Broadnax, Valerie Fetzer, Jörn Müller-Quade, Andy Rupp
2017/1068 (PDF ) Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data Marie-Sarah Lacharité, Kenneth G. Paterson
2017/1067 (PDF ) Regulating Storage Overhead in Existing PoW-based Blockchains Frederik Armknecht, Jens-Matthias Bohli, Ghassan O. Karame, Wenting Li
2017/1066 (PDF ) Bulletproofs: Short Proofs for Confidential Transactions and More Benedikt Bünz, Jonathan Bootle, Dan Boneh, Andrew Poelstra, Pieter Wuille, Greg Maxwell
2017/1064 (PDF ) An Algebraic Approach to Maliciously Secure Private Set Intersection Satrajit Ghosh, Tobias Nilges
2017/1063 (PDF ) Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly (Full Version) Qingju Wang, Yonglin Hao, Yosuke Todo, Chaoyun Li, Takanori Isobe, Willi Meier
2017/1062 (PDF ) Towards Breaking the Exponential Barrier for General Secret Sharing Tianren Liu, Vinod Vaikuntanathan, Hoeteck Wee
2017/1061 (PDF ) Non-Malleable Codes from Average-Case Hardness: AC0, Decision Trees, and Streaming Space-Bounded Tampering Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Tal Malkin
2017/1060 (PDF ) Thwarting Leakage Abuse Attacks against Searchable Encryption -- A Formal Approach and Applications to Database Padding Raphael Bost, Pierre-Alain Fouque
2017/1059 (PDF ) CP-consensus: a Blockchain Protocol Based on Synchronous Timestamps of Compass Satellite Lijing Zhou, Licheng Wang, Yiru Sun
2017/1058 (PDF ) Optimal Key Consensus in Presence of Noise Zhengzhong Jin, Yunlei Zhao
2017/1057 (PDF ) Montgomery Arithmetic from a Software Perspective Joppe W. Bos, Peter L. Montgomery
2017/1056 (PDF ) Round-Optimal Secure Multi-Party Computation Shai Halevi, Carmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam
2017/1055 (PDF ) Cellular Automata Based S-boxes Luca Mariot, Stjepan Picek, Alberto Leporati, Domagoj Jakobovic
2017/1054 (PDF ) On the security of another CRC based ultralightweight RFID authentication protocol Seyed Farhad Aghili, Hamid Mala
2017/1053 (PDF ) A Note on 'Further Improving Efficiency of Higher-Order Masking Scheme by Decreasing Randomness Complexity' Gilles Barthe, François Dupressoir, Benjamin Grégoire
2017/1052 (PDF ) Early Detection and Analysis of Leakage Abuse Vulnerabilities Charles V. Wright, David Pouliot
2017/1051 (PDF ) A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher Xinping Zhou, Carolyn Whitnall, Elisabeth Oswald, Degang Sun, Zhu Wang
2017/1050 (PDF ) Scalable Multi-party Computation for zk-SNARK Parameters in the Random Beacon Model Sean Bowe, Ariel Gabizon, Ian Miers
2017/1049 (PDF ) A Practical Implementation of Identity-Based Encryption over NTRU Lattices Sarah McCarthy, Neil Smyth, Elizabeth O’Sullivan
2017/1048 (PDF ) Non-malleable Codes against Lookahead Tampering Divya Gupta, Hemanta K. Maji, Mingyuan Wang
2017/1047 (PDF ) Consolidating Inner Product Masking Josep Balasch, Sebastian Faust, Benedikt Gierlichs, Clara Paglialonga, François-Xavier Standaert
2017/1046 (PDF ) Approximate Thumbnail Preserving Encryption Byron Marohn, Charles V. Wright, Wu-chi Feng, Mike Rosulek, Rakesh B. Bobba
2017/1045 (PDF ) Tightly-Secure PAK(E) José Becerra, Vincenzo Iovino, Dimiter Ostrev, Petra Šala, Marjan Škrobot
2017/1044 (PDF ) Strain: A Secure Auction for Blockchains Erik-Oliver Blass, Florian Kerschbaum
2017/1043 (PDF ) An E-voting Protocol Based on Blockchain Yi Liu, Qi Wang
2017/1042 (PDF ) On one-round reliable message transmission René Bødker Christensen
2017/1041 (PDF ) Compact Zero-Knowledge Proofs of Small Hamming Weight Ivan Damgård, Ji Luo, Sabine Oechsner, Peter Scholl, Mark Simkin
2017/1039 (PDF ) Dronecrypt - An Efficient Cryptographic Framework for Small Aerial Drones Muslum Ozgur Ozmen, Attila A. Yavuz
2017/1038 (PDF ) Embedded Proofs for Verifiable Neural Networks Hervé Chabanne, Julien Keuffer, Refik Molva
2017/1037 (PDF ) DAGS: Key Encapsulation using Dyadic GS Codes Gustavo Banegas, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiecoumba Gueye, Richard Haeussler, Jean Belo Klamti, Ousmane N'diaye, Duc Tri Nguyen, Edoardo Persichetti, Jefferson E. Ricardini
2017/1036 (PDF ) Rotational-XOR Cryptanalysis of Reduced-round SPECK Yunwen Liu, Glenn De Witte, Adrián Ranea, Tomer Ashur
2017/1035 (PDF ) Privacy-respecting Reward Generation and Accumulation for Participatory Sensing Applications Tassos Dimitriou
2017/1034 (PDF ) Tight on Budget? Tight Bounds for r-Fold Approximate Differential Privacy Sebastian Meiser, Esfandiar Mohammadi
2017/1033 (PDF ) Foundations of Differentially Oblivious Algorithms T-H. Hubert Chan, Kai-Min Chung, Bruce Maggs, Elaine Shi
2017/1032 (PDF ) Performing Computations on Hierarchically Shared Secrets Giulia Traverso, Denise Demirel, Johannes Buchmann
2017/1031 (PDF ) Lightweight Design Choices for LED-like Block Ciphers Sumanta Sarkar, Habeeb Syed, Rajat Sadhukhan, Debdeep Mukhopadhyay
2017/1030 (PDF ) New MILP Modeling: Improved Conditional Cube Attacks on Keccak-based Constructions Ling Song, Jian Guo, Danping Shi, San Ling
2017/1029 (PDF ) Efficient Designated-Verifier Non-Interactive Zero-Knowledge Proofs of Knowledge Pyrros Chaidos, Geoffroy Couteau
2017/1028 (PDF ) Cryptanalysis of 1-Round KECCAK Rajendra Kumar, Mahesh Sreekumar Rajasree, Hoda AlKhzaimi
2017/1027 (PDF ) Eliminating Variables in Boolean Equation Systems Bjørn Møller Greve, Håvard Raddum, Gunnar Fløystad, Øyvind Ytrehus
2017/1025 (PDF ) Rounded Gaussians -- Fast and Secure Constant-Time Sampling for Lattice-Based Crypto Andreas Hülsing, Tanja Lange, Kit Smeets
2017/1024 (PDF ) Revisiting a Masked Lookup-Table Compression Scheme Srinivas Vivek
2017/1023 (PDF ) Several Masked Implementations of the Boyar-Peralta AES S-Box Ashrujit Ghoshal, Thomas De Cnudde
2017/1022 (PDF ) Direct Anonymous Attestation from Lattices Rachid El Bansarkhani, Ali El Kaafarani
2017/1021 (PDF ) Bricklayer Attack: A Side-Channel Analysis on the ChaCha Quarter Round Alexandre Adomnicai, Jacques J. A. Fournier, Laurent Masson
2017/1020 (PDF ) A Novel Pre-Computation Scheme of Window $\tau$NAF for Koblitz Curves Wei Yu, Saud Al Musa, Guangwu Xu, Bao Li
2017/1019 (PDF ) Looting the LUTs : FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption Mustafa Khairallah, Anupam Chattopadhyay, Thomas Peyrin
2017/1018 (PDF ) A Fair Protocol for Data Trading Based on Bitcoin Transactions Sergi Delgado-Segura, Cristina Pérez-Solà, Guillermo Navarro-Arribas, Jordi Herrera-Joancomart\'ı
2017/1017 (PDF ) Differential Cryptanalysis of 18-Round PRIDE Virginie Lallemand, Shahram Rasoolzadeh
2017/1016 (PDF ) Differentially Private Access Patterns in Secure Computation Sahar Mazloom, S. Dov Gordon
2017/1015 (PDF ) A Faster Software Implementation of the Supersingular Isogeny Diffie-Hellman Key Exchange Protocol Armando Faz-Hernández, Julio López, Eduardo Ochoa-Jiménez, Francisco Rodríguez-Henríquez
2017/1014 (PDF ) Attacking Deterministic Signature Schemes using Fault Attacks Damian Poddebniak, Juraj Somorovsky, Sebastian Schinzel, Manfred Lochter, Paul Rösler
2017/1013 (PDF ) Homomorphic SIM$^2$D Operations: Single Instruction Much More Data Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
2017/1012 (PDF ) Conditional Cube Attack on Round-Reduced River Keyak Wenquan Bi, Zheng Li, Xiaoyang Dong, Lu Li, Xiaoyun Wang
2017/1011 (PDF ) Efficient and Universally Composable Protocols for Oblivious Transfer from the CDH Assumption Eduard Hauck, Julian Loss
2017/1009 (PDF ) Architecture level Optimizations for Kummer based HECC on FPGAs Gabriel Gallin, Turku Ozlum Celik, Arnaud Tisserand
2017/1008 (PDF ) Automatic Characterization of Exploitable Faults: A Machine Learning Approach Sayandeep Saha, Dirmanto Jap, Sikhar Patranabis, Debdeep Mukhopadhyay, Shivam Bhasin, Pallab Dasgupta
2017/1007 (PDF ) Malware encryption schemes - rerandomizable ciphertexts encrypted using environmental keys Herman Galteland, Kristian Gjøsteen
2017/1006 (PDF ) Round and Communication Efficient Unconditionally-secure MPC with $t < n/3$ in Partially Synchronous Network Ashish Choudhury, Arpita Patra, Divya Ravi
2017/1005 (PDF ) Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model Tsunekazu Saito, Keita Xagawa, Takashi Yamakawa
2017/1004 (PDF ) Garbled Protocols and Two-Round MPC from Bilinear Maps Sanjam Garg, Akshayaram Srinivasan
2017/1003 (PDF ) Secure Multi-Party Computation in Large Networks Varsha Dani, Valerie King, Mahnush Movahedi, Jared Saia, Mahdi Zamani
2017/1002 (PDF ) On the Closest Vector Problem for Lattices Constructed from Polynomials and Their Cryptographic Applications Zhe Li, San Ling, Chaoping Xing, Sze Ling Yeo
2017/1001 (PDF ) Impossibility of Order-Revealing Encryption in Idealized Models Mark Zhandry, Cong Zhang
2017/1000 (PDF ) No right to remain silent: Isolating Malicious Mixes Hemi Leibowitz, Ania Piotrowska, George Danezis, Amir Herzberg
2017/999 (PDF ) Shortest Vector from Lattice Sieving: a Few Dimensions for Free Léo Ducas
2017/998 (PDF ) A Comparative Investigation of Approximate Attacks on Logic Encryptions Yuanqi Shen, Amin Rezaei, Hai Zhou
2017/997 (PDF ) Hash Proof Systems over Lattices Revisited Fabrice Benhamouda, Olivier Blazy, Léo Ducas, Willy Quach
2017/996 (PDF ) Large FHE gates from Tensored Homomorphic Accumulator Guillaume Bonnoron, Léo Ducas, Max Fillinger
2017/995 (PDF ) A signature scheme from Learning with Truncation Jeffrey Hoffstein, Jill Pipher, William Whyte, Zhenfei Zhang
2017/994 (PDF ) Separable Statistics and Multidimensional Linear Cryptanalysis S. Fauskanger, I. Semaev
2017/993 (PDF ) A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM Paulo S. L. M. Barreto, Bernardo David, Rafael Dowsley, Kirill Morozov, Anderson C. A. Nascimento
2017/992 (PDF ) Leakage Bounds for Gaussian Side Channels Thomas Unterluggauer, Thomas Korak, Stefan Mangard, Robert Schilling, Luca Benini, Frank Gürkaynak, Michael Muehlberghuber
2017/991 (PDF ) Secure Code Updates for Smart Embedded Devices based on PUFs Wei Feng, Yu Qin, Shijun Zhao, Ziwen Liu, Xiaobo Chu, Dengguo Feng
2017/990 (PDF ) Bounds on Differential and Linear Branch Number of Permutations Sumanta Sarkar, Habeeb Syed
2017/989 (PDF ) Decentralized Multi-Client Functional Encryption for Inner Product Jérémy Chotard, Edouard Dufour-Sans, Romain Gay, Duong Hieu Phan, David Pointcheval
2017/988 (PDF ) On Rejection Sampling Algorithms for Centered Discrete Gaussian Distribution over Integers Yusong Du, Baodian Wei
2017/987 (PDF ) Key Dependent Message Security and Receiver Selective Opening Security for Identity-Based Encryption Fuyuki Kitagawa, Keisuke Tanaka
2017/986 (PDF ) On the Hardness of Computing Endomorphism Rings of Supersingular Elliptic Curves Kirsten Eisentraeger, Sean Hallgren, Travis Morrison
2017/985 (PDF ) Breaking Ed25519 in WolfSSL Niels Samwel, Lejla Batina, Guido Bertoni, Joan Daemen, Ruggero Susella
2017/984 (PDF ) Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks Marc Fischlin, Sogol Mazaheri
2017/983 (PDF ) Attribute-Based Encryption in the Generic Group Model: Automated Proofs and New Constructions Miguel Ambrona, Gilles Barthe, Romain Gay, Hoeteck Wee
2017/982 (PDF ) Mind the Gap: Where Provable Security and Real-World Messaging Don't Quite Meet Katriel Cohn-Gordon, Cas Cremers
2017/981 (PDF ) Efficient Maliciously Secure Multiparty Computation for RAM Marcel Keller, Avishay Yanai
2017/980 (PDF ) Yoyo Tricks with AES Sondre Rønjom, Navid Ghaedi Bardeh, Tor Helleseth
2017/979 (PDF ) Privacy-Preserving Ridge Regression with only Linearly-Homomorphic Encryption Irene Giacomelli, Somesh Jha, Marc Joye, C. David Page, Kyonghwan Yoon
2017/978 (PDF ) New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Daniel Masny
2017/977 (PDF ) Cryptanalysis against Symmetric-Key Schemes with Online Classical Queries and Offline Quantum Computations Akinori Hosoyamada, Yu Sasaki
2017/976 (PDF ) Improvements for Gate-Hiding Garbled Circuits Mike Rosulek
2017/975 (PDF ) Differential Attacks on Deterministic Signatures Christopher Ambrose, Joppe W. Bos, Björn Fay, Marc Joye, Manfred Lochter, Bruce Murray
2017/974 (PDF ) Obscuro: A Bitcoin Mixer using Trusted Execution Environments Muoi Tran, Loi Luu, Min Suk Kang, Iddo Bentov, Prateek Saxena
2017/973 (PDF ) Symmetric Searchable Encryption with Sharing and Unsharing Sarvar Patel, Giuseppe Persiano, Kevin Yeo
2017/972 (PDF ) Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions without Pairings Michel Abdalla, Dario Catalano, Dario Fiore, Romain Gay, Bogdan Ursu
2017/971 (PDF ) A Fast, Practical and Simple Shortest Path Protocol for Multiparty Computation Abdelrahaman Aly, Sara Cleemput
2017/970 (PDF ) A New Functional Encryption for Multidimensional Range Query Jia Xu, Ee-Chien Chang, Jianying Zhou
2017/969 (PDF ) Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation Bei Liang, Aikaterini Mitrokotsa
2017/968 (PDF ) Template Attack on Blinded Scalar Multiplication with Asynchronous perf-ioctl Calls Sarani Bhattacharya, Clementine Maurice, Shivam Bhasin, Debdeep Mukhopadhyay
2017/967 (PDF ) Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions Zvika Brakerski, Alex Lombardi, Gil Segev, Vinod Vaikuntanathan
2017/966 (PDF ) Optimal Parameters for XMSS^MT Andreas Hülsing, Lea Rausch, Johannes Buchmann
2017/965 (PDF ) WOTS+ -- Shorter Signatures for Hash-Based Signature Schemes Andreas Hülsing
2017/964 (PDF ) Recursive ORAMs with Practical Constructions Sarvar Patel, Giuseppe Persiano, Kevin Yeo
2017/963 (PDF ) Non-Interactive Proofs of Proof-of-Work Aggelos Kiayias, Andrew Miller, Dionysis Zindros
2017/962 (PDF ) Hard and Easy Problems for Supersingular Isogeny Graphs Christophe Petit, Kristin Lauter
2017/961 (PDF ) An Offline Dictionary Attack against zkPAKE Protocol Jose Becerra, Peter Y. A. Ryan, Petra Sala, Marjan Skrobot
2017/960 (PDF ) Unforgeable Quantum Encryption Gorjan Alagic, Tommaso Gagliardoni, Christian Majenz
2017/959 (PDF ) Choosing Parameters for the Subfield Lattice Attack against overstretched NTRU Dung Hoang Duong, Masaya Yasuda, Tsuyoshi Takagi
2017/958 (PDF ) Two-Message, Oblivious Evaluation of Cryptographic Functionalities Nico Döttling, Nils Fleischhacker, Johannes Krupp, Dominique Schröder
2017/957 (PDF ) From Selective IBE to Full IBE and Selective HIBE Nico Döttling, Sanjam Garg
2017/956 (PDF ) Threshold Cryptosystems From Threshold Fully Homomorphic Encryption Dan Boneh, Rosario Gennaro, Steven Goldfeder, Aayush Jain, Sam Kim, Peter M. R. Rasmussen, Amit Sahai
2017/955 (PDF ) Towards Practical Privacy-Preserving Genome-Wide Association Study Charlotte Bonte, Eleftheria Makri, Amin Ardeshirdavani, Jaak Simm, Yves Moreau, Frederik Vercauteren
2017/954 (PDF ) Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency---Choose Two Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate
2017/953 (PDF ) Threshold Kleptographic Attacks on Discrete Logarithm Based Signatures George Teseleanu
2017/952 (PDF ) Secure Two-Party Computation with Fairness -- A Necessary Design Principle Yehuda Lindell, Tal Rabin
2017/951 (PDF ) Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics Nina Bindel, Johannes Buchmann, Juliane Krämer, Heiko Mantel, Johannes Schickel, Alexandra Weber
2017/950 (PDF ) Blockwise $p$-Tampering Attacks on Cryptographic Primitives, Extractors, and Learners Saeed Mahloujifar, Mohammad Mahmoody
2017/949 (PDF ) Practical and Robust Secure Logging from Fault-Tolerant Sequential Aggregate Signatures Gunnar Hartung, Björn Kaidel, Alexander Koch, Jessica Koch, Dominik Hartmann
2017/948 (PDF ) Evolving Secret Sharing: Dynamic Thresholds and Robustness Ilan Komargodski, Anat Paskin-Cherniavsky
2017/947 (PDF ) Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model Carmit Hazay, Yuval Ishai, Muthuramakrishnan Venkitasubramaniam
2017/946 (PDF ) The MMap Strikes Back: Obfuscation and New Multilinear Maps Immune to CLT13 Zeroizing Attacks Fermi Ma, Mark Zhandry
2017/945 (PDF ) Moderately Hard Functions: Definition, Instantiations, and Applications Joël Alwen, Björn Tackmann
2017/944 (PDF ) A Unified Approach to Constructing Black-box UC Protocols in Trusted Setup Models Susumu Kiyoshima, Huijia Lin, Muthuramakrishnan Venkitasubramaniam
2017/943 (PDF ) When does Functional Encryption Imply Obfuscation? Sanjam Garg, Mohammad Mahmoody, Ameer Mohammed
2017/942 (PDF ) On Secure Two-Party Computation in Three Rounds Prabhanjan Ananth, Abhishek Jain
2017/940 (PDF ) Linear Secret-Sharing Schemes for Forbidden Graph Access Structures Amos Beimel, Oriol Farràs, Yuval Mintz, Naty Peter
2017/939 (PDF ) Towards Optimal Pre-processing in Leakage Detection Changhai Ou, Degang Sun, Zhu Wang, Xinping Zhou
2017/938 (PDF ) On the security of the WOTS-PRF signature scheme Philip Lafrance, Alfred Menezes
2017/937 (PDF ) Random Oracles and Non-Uniformity Sandro Coretti, Yevgeniy Dodis, Siyao Guo, John Steinberger
2017/936 (PDF ) A tight security reduction in the quantum random oracle model for code-based signature schemes André Chailloux, Thomas Debris-Alazard
2017/935 (PDF ) Overcoming Cryptographic Impossibility Results using Blockchains Rishab Goyal, Vipul Goyal
2017/934 (PDF ) Adaptively Indistinguishable Garbled Circuits Zahra Jafargholi, Alessandra Scafuro, Daniel Wichs
2017/933 (PDF ) Improving Stateless Hash-Based Signatures Jean-Philippe Aumasson, Guillaume Endignoux
2017/932 (PDF ) Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs Nils Wisiol, Christoph Graebnitz, Marian Margraf, Manuel Oswald, Tudor A. A. Soroceanu, Benjamin Zengin
2017/931 (PDF ) Delayed-Input Non-Malleable Zero Knowledge and Multi-Party Coin Tossing in Four Rounds Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Ivan Visconti
2017/930 (PDF ) Four-state Non-malleable Codes with Explicit Constant Rate Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar
2017/929 (PDF ) How to Securely Compute with Noisy Leakage in Quasilinear Complexity Dahmun Goudarzi, Antoine Joux, Matthieu Rivain
2017/928 (PDF ) Environmental Authentication in Malware Jeremy Blackthorne, Benjamin Kaiser, Benjamin Fuller, Bulent Yener
2017/927 (PDF ) Near-Optimal Secret Sharing and Error Correcting Codes in AC0 Kuan Cheng, Yuval Ishai, Xin Li
2017/926 (PDF ) How to Construct a Leakage-Resilient (Stateless) Trusted Party Daniel Genkin, Yual Ishai, Mor Weiss
2017/925 (PDF ) Resettably-Sound Resettable Zero Knowledge in Constant Rounds Wutichai Chongchitmate, Rafail Ostrovsky, Ivan Visconti
2017/924 (PDF ) Oblivious Hashing Revisited, and Applications to Asymptotically Efficient ORAM and OPRAM T-H. Hubert Chan, Yue Guo, Wei-Kai Lin, Elaine Shi
2017/923 (PDF ) Batched Multi-hop Multi-key FHE from ring-LWE with Compact Ciphertext Extension Long Chen, Zhenfeng Zhang, Xueqing Wang
2017/922 (PDF ) On the impossibility of entropy reversal, and its application to zero-knowledge proofs Shachar Lovett, Jiapeng Zhang
2017/921 (PDF ) RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero Shi-Feng Sun, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Dawu Gu
2017/920 (PDF ) Round-Optimal Secure Two-Party Computation from Trapdoor Permutations Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Ivan Visconti
2017/919 (PDF ) Improving the Linear Programming Technique in the Search for Lower Bounds in Secret Sharing Oriol Farràs, Tarik Kaced, Sebastià Martín, Carles Padró
2017/918 (PDF ) Linear Repairing Codes and Side-Channel Attacks Hervé Chabanne, Houssem Maghrebi, Emmanuel Prouff
2017/917 (PDF ) A practical, perfectly secure password scheme in the bounded retrieval model Moses Liskov
2017/916 (PDF ) A Concrete Treatment of Fiat-Shamir Signatures in the Quantum Random-Oracle Model Eike Kiltz, Vadim Lyubashevsky, Christian Schaffner
2017/915 (PDF ) Efficient Algorithms for Broadcast and Consensus Based on Proofs of Work Lisa Eckey, Sebastian Faust, Julian Loss
2017/914 (PDF ) Cache-Oblivious and Data-Oblivious Sorting and Applications T-H. Hubert Chan, Yue Guo, Wei-Kai Lin, Elaine Shi
2017/913 (PDF ) Thunderella: Blockchains with Optimistic Instant Confirmation Rafael Pass, Elaine Shi
2017/912 (PDF ) On Two Round Rerunnable MPC Protocols Paul Laird
2017/911 (PDF ) Variable-Length Bit Mapping and Error-Correcting Codes for Higher-Order Alphabet PUFs Vincent Immler, Matthias Hiller, Qinzhi Liu, Andreas Lenz, Antonia Wachter-Zeh
2017/910 (PDF ) Thwarting Fault Attacks using the Internal Redundancy Countermeasure (IRC) Benjamin Lac, Anne Canteaut, Jacques J. A. Fournier, Renaud Sirdey
2017/909 (PDF ) Clarifying the subset-resilience problem Jean-Philippe Aumasson, Guillaume Endignoux
2017/908 (PDF ) Yet Another Compiler for Active Security or: Efficient MPC Over Arbitrary Rings Ivan Damgård, Claudio Orlandi, Mark Simkin
2017/907 (PDF ) On the differential equivalence of APN functions Anastasiya Gorodilova
2017/906 (PDF ) Notes On GGH13 Without The Presence Of Ideals Martin R. Albrecht, Alex Davidson, Enrique Larraia, Alice Pellet--Mary
2017/905 (PDF ) Shorter Ring Signatures from Standard Assumptions Alonso González
2017/904 (PDF ) On Iterative Collision Search for LPN and Subset Sum Srinivas Devadas, Ling Ren, Hanshen Xiao
2017/903 (PDF ) On Zero-Testable Homomorphic Encryption and Publicly Verifiable Non-Interactive Arguments Omer Paneth, Guy N. Rothblum
2017/902 (PDF ) How Low Can You Go? Short Structure-Preserving Signatures for Diffie-Hellman Vectors Essam Ghadafi
2017/901 (PDF ) Stateful Multi-Client Verifiable Computation Christian Cachin, Esha Ghosh, Dimitrios Papadopoulos, Björn Tackmann
2017/900 (PDF ) Proof of a shuffle for lattice-based cryptography (Full version) Núria Costa, Ramiro Martínez, Paz Morillo
2017/899 (PDF ) Kaleidoscope: An Efficient Poker Protocol with Payment Distribution and Penalty Enforcement Bernardo David, Rafael Dowsley, Mario Larangeira
2017/898 (PDF ) Putting Wings on SPHINCS Stefan Kölbl
2017/897 (PDF ) Formal Verification of Masked Hardware Implementations in the Presence of Glitches Roderick Bloem, Hannes Gross, Rinat Iusupov, Bettina Könighofer, Stefan Mangard, Johannes Winter
2017/896 (PDF ) Design, Implementation and Performance Analysis of Highly Efficient Algorithms for AES Key Retrieval in Access-driven Cache-based Side Channel Attacks Ashokkumar C, M. Bhargav Sri Venkatesh, Ravi Prakash Giri, Bernard Menezes
2017/895 (PDF ) Linear Cryptanalysis of DES with Asymmetries Andrey Bogdanov, Philip S. Vejre
2017/894 (PDF ) An Efficient Pairing-Based Shuffle Argument Prastudy Fauzi, Helger Lipmaa, Janno Siim, Michal Zajac
2017/893 (PDF ) Beyond Hellman's Time-Memory Trade-Offs with Applications to Proofs of Space Hamza Abusalah, Joël Alwen, Bram Cohen, Danylo Khilko, Krzysztof Pietrzak, Leonid Reyzin
2017/892 (PDF ) The Iterated Random Function Problem Ritam Bhaumik, Nilanjan Datta, Avijit Dutta, Nicky Mouha, Mridul Nandi
2017/891 (PDF ) Finding Bugs in Cryptographic Hash Function Implementations Nicky Mouha, Mohammad S Raunak, D. Richard Kuhn, Raghu Kacker
2017/890 (PDF ) On the One-Per-Message Unforgeability of (EC)DSA and its Variants Manuel Fersch, Eike Kiltz, Bertram Poettering
2017/889 (PDF ) On Fast Multiplication in Binary Finite Fields and Optimal Primitive Polynomials over GF(2) Alexander Maximov, Helena Sjoberg
2017/888 (PDF ) Asynchronous provably-secure hidden services Philippe Camacho, Fernando Krell
2017/887 (PDF ) Succinct Spooky Free Compilers Are Not Black Box Sound Zvika Brakerski, Yael Tauman Kalai, Renen Perlman
2017/886 (PDF ) Compression for trace zero points on twisted Edwards curves Giulia Bianco, Elisa Gorla
2017/885 (PDF ) PermuteRam: Optimizing Oblivious Computation for Efficiency Shruti Tople, Hung Dang, Prateek Saxena, Ee-Chien Chang
2017/884 (PDF ) Scalar multiplication in compressed coordinates in the trace-zero subgroup Giulia Bianco, Elisa Gorla
2017/883 (PDF ) Strengthening the Security of Encrypted Databases: Non-Transitive JOINs Ilya Mironov, Gil Segev, Ido Shahaf
2017/882 (PDF ) Towards an in-depth understanding of privacy parameters for randomized sanitization mechanisms Baptiste Olivier, Tony Quertier
2017/881 (PDF ) Möbius: Trustless Tumbling for Transaction Privacy Sarah Meiklejohn, Rebekah Mercer
2017/880 (PDF ) Using the Estonian Electronic Identity Card for Authentication to a Machine (Extended Version) Danielle Morgan, Arnis Parsovs
2017/879 (PDF ) Formal Verification of Side-channel Countermeasures via Elementary Circuit Transformations Jean-Sebastien Coron
2017/878 (PDF ) Raziel: Private and Verifiable Smart Contracts on Blockchains David Cerezo Sánchez
2017/877 (PDF ) Identity-Based Format-Preserving Encryption Mihir Bellare, Viet Tung Hoang
2017/876 (PDF ) All-But-Many Lossy Trapdoor Functions and Selective Opening Chosen-Ciphertext Security from LWE Benoit Libert, Amin Sakzad, Damien Stehle, Ron Steinfeld
2017/875 (PDF ) Instantaneous Decentralized Poker Iddo Bentov, Ranjit Kumaresan, Andrew Miller
2017/874 (PDF ) Non-Trivial Witness Encryption and Null-iO from Standard Assumptions Zvika Brakerski, Aayush Jain, Ilan Komargodski, Alain Passelegue, Daniel Wichs
2017/873 (PDF ) Cycle Slicer: An Algorithm for Building Permutations on Special Domains Sarah Miracle, Scott Yilek
2017/872 (PDF ) Linear-Time Zero-Knowledge Proofs for Arithmetic Circuit Satisfiability Jonathan Bootle, Andrea Cerulli, Essam Ghadafi, Jens Groth, Mohammad Hajiabadi, Sune K. Jakobsen
2017/871 (PDF ) Non-Interactive Multiparty Computation without Correlated Randomness Shai Halevi, Yuval Ishai, Abhishek Jain, Ilan Komargodski, Amit Sahai, Eylon Yogev
2017/870 (PDF ) Tightly-Secure Signatures from Five-Move Identification Protocols Eike Kiltz, Julian Loss, Jiaxin Pan
2017/869 (PDF ) Amortizing Randomness Complexity in Private Circuits Sebastian Faust, Clara Paglialonga, Tobias Schneider
2017/868 (PDF ) New Key Recovery Attacks on Minimal Two-Round Even-Mansour Ciphers Takanori Isobe, Kyoji Shibutani
2017/867 (PDF ) On the security of a Certificateless Proxy Re-Encryption Scheme without Pairing Arinjita Paul, S. Sharmila Deva Selvi, C. Pandu Rangan
2017/866 (PDF ) Enhanced Modelling of Authenticated Key Exchange Security Papa B. Seye, Augustin P. Sarr
2017/865 (PDF ) The First Thorough Side-Channel Hardware Trojan Maik Ender, Samaneh Ghandali, Amir Moradi, Christof Paar
2017/864 (PDF ) Quantum Multicollision-Finding Algorithm Akinori Hosoyamada, Yu Sasaki, Keita Xagawa
2017/863 (PDF ) The Minimum Number of Cards in Practical Card-based Protocols Julia Kastner, Alexander Koch, Stefan Walzer, Daiki Miyahara, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone
2017/862 (PDF ) Efficient Scalable Constant-Round MPC via Garbled Circuits Aner Ben-Efraim, Yehuda Lindell, Eran Omri
2017/861 (PDF ) On the Depth of Oblivious Parallel RAM T-H. Hubert Chan, Kai-Min Chung, Elaine Shi
2017/860 (PDF ) Automatic Search of Bit-Based Division Property for ARX Ciphers and Word-Based Division Property Ling Sun, Wei Wang, Meiqin Wang
2017/859 (PDF ) ABE with Tag Made Easy: Concise Framework and New Instantiations in Prime-order Groups Jie Chen, Junqing Gong
2017/858 (PDF ) Differential Fault Analysis of SHA-3 under Relaxed Fault Models Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding
2017/857 (PDF ) Image Classification using non-linear Support Vector Machines on Encrypted Data Anthony Barnett, Jay Santokhi, Michael Simpson, Nigel P. Smart, Charlie Stainton-Bygrave, Srnivas Vivek, Adrian Waller
2017/856 (PDF ) Zero-Knowledge Arguments for Lattice-Based PRFs and Applications to E-Cash Benoît Libert, San Ling, Khoa Nguyen, Huaxiong Wang
2017/855 (PDF ) Fault Attack on ACORN v3 Xiaojuan Zhang, Xiutao Feng, Dongdai Lin
2017/854 (PDF ) Zero-Knowledge Password Policy Check from Lattices Khoa Nguyen, Benjamin Hong Meng Tan, Huaxiong Wang
2017/853 (PDF ) Generic Forward-Secure Key Agreement Without Signatures Cyprien de Saint Guilhem, Nigel P. Smart, Bogdan Warinschi
2017/852 (PDF ) Blockcipher-based MACs: Beyond the Birthday Bound without Message Length Yusuke Naito
2017/851 (PDF ) How to Use Metaheuristics for Design of Symmetric-Key Primitives Ivica Nikolić
2017/850 (PDF ) Breaking and Fixing Secure Similarity Approximations: Dealing with Adversarially Perturbed Inputs Evgenios M. Kornaropoulos, Petros Efstathopoulos
2017/849 (PDF ) FAST: Disk Encryption and Beyond Debrup Chakraborty, Sebati Ghosh, Cuauhtemoc Mancillas Lopez, Palash Sarkar
2017/848 (PDF ) Single Key Variant of PMAC_Plus Nilanjan Datta, Avijit Dutta, Mridul Nandi, Goutam Paul, Liting Zhang
2017/847 (PDF ) An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography André Chailloux, María Naya-Plasencia, André Schrottenloher
2017/846 (PDF ) How to Prove Megabytes (Per Second) Yaron Gvili
2017/845 (PDF ) Improved Security for OCB3 Ritam Bhaumik, Mridul Nandi
2017/844 (PDF ) Implementing Conjunction Obfuscation under Entropic Ring LWE David Bruce Cousins, Giovanni Di Crescenzo, Kamil Doruk Gür, Kevin King, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan, Erkay Savaş
2017/843 (PDF ) Hybrid Encryption in a Multi-User Setting, Revisited Federico Giacon, Eike Kiltz, Bertram Poettering
2017/842 (PDF ) Quam Bene Non Quantum: Bias in a Family of Quantum Random Number Generators Darren Hurley-Smith, Julio Hernandez-Castro
2017/841 (PDF ) Efficient Length Doubling From Tweakable Block Ciphers Yu Long Chen, Atul Luykx, Bart Mennink, Bart Preneel
2017/840 (PDF ) Fast Scalar Multiplication for Elliptic Curves over Binary Fields by Efficiently Computable Formulas Saud Al Musa, Guangwu Xu
2017/839 (PDF ) Noiseless Fully Homomorphic Encryption Jing Li, Licheng Wang
2017/838 (PDF ) Two-Round PAKE from Approximate SPH and Instantiations from Lattices Jiang Zhang, Yu Yu
2017/837 (PDF ) Tight Security Analysis of EHtM MAC Avijit Dutta, Ashwin Jha, Mridul Nandi
2017/836 (PDF ) Efficient Square-based Montgomery Multiplier for All Type C.1 Pentanomials Yin Li, Xingpo Ma, Qin Chen, Chuanda Qi
2017/835 (PDF ) Coppersmith's lattices and ``focus groups'': an attack on small-exponent RSA Stephen D. Miller, Bhargav Narayanan, Ramarathnam Venkatesan
2017/834 (PDF ) Authentication from Weak PRFs with Hidden Auxiliary Input Daniel Masny
2017/833 (PDF ) Efficient Hybrid Proxy Re-Encryption for Practical Revocation and Key Rotation Steven Myers, Adam Shull
2017/832 (PDF ) Mixture Differential Cryptanalysis and Structural Truncated Differential Attacks on round-reduced AES Lorenzo Grassi
2017/831 (PDF ) Security Proof of JAMBU under Nonce Respecting and Nonce Misuse Cases Geng Wang, Haiyang Zhang, Fengmei Liu
2017/830 (PDF ) Security proof for Round Robin Differential Phase Shift QKD Daan Leermakers, Boris Skoric
2017/829 (PDF ) Fault Attacks Made Easy: Differential Fault Analysis Automation on Assembly Code Jakub Breier, Xiaolu Hou, Yang Liu
2017/827 (PDF ) Scaling ORAM for Secure Computation Jack Doerner, abhi shelat
2017/826 (PDF ) 5Gen-C: Multi-input Functional Encryption and Program Obfuscation for Arithmetic Circuits Brent Carmer, Alex J. Malozemoff, Mariana Raykova
2017/825 (PDF ) Querying for Queries: Indexes of Queries for Efficient and Expressive IT-PIR Syed Mahbub Hafiz, Ryan Henry
2017/824 (PDF ) Improved Security Notions for Proxy Re-Encryption to Enforce Access Control Ela Lee
2017/823 (PDF ) Revive: Rebalancing Off-Blockchain Payment Networks Rami Khalil, Arthur Gervais
2017/822 (PDF ) On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs Shahin Tajik, Heiko Lohrke, Jean-Pierre Seifert, Christian Boit
2017/821 (PDF ) A Fast and Verified Software Stack for Secure Function Evaluation José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Vitor Pereira
2017/820 (PDF ) Concurrency and Privacy with Payment-Channel Networks Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Srivatsan Ravi
2017/819 (PDF ) S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing Thang Hoang, Ceyhun D. Ozkaptan, Attila A. Yavuz, Jorge Guajardo, Tam Nguyen
2017/818 (PDF ) No-Match Attacks and Robust Partnering Definitions – Defining Trivial Attacks for Security Protocols is Not Trivial Yong Li, Sven Schäge
2017/816 (PDF ) A Framework for Constructing Fast MPC over Arithmetic Circuits with Malicious Adversaries and an Honest-Majority Yehuda Lindell, Ariel Nof
2017/815 (PDF ) Revisiting the Expected Cost of Solving uSVP and Applications to LWE Martin R. Albrecht, Florian Göpfert, Fernando Virdia, Thomas Wunderer
2017/814 (PDF ) Fast FPGA Implementations of Diffie-Hellman on the Kummer Surface of a Genus-2 Curve Philipp Koppermann, Fabrizio De Santis, Johann Heyszl, Georg Sigl
2017/813 (PDF ) Industrial Feasibility of Private Information Retrieval Angela Jäschke, Björn Grohmann, Frederik Armknecht, Andreas Schaad
2017/812 (PDF ) Optimal PRFs from Blockcipher Designs Bart Mennink, Samuel Neves
2017/811 (PDF ) Reassessing Grover's Algorithm Scott Fluhrer
2017/810 (PDF ) The TypTop System: Personalized Typo-Tolerant Password Checking Rahul Chatterjee, Joanne Woodage, Yuval Pnueli, Anusha Chowdhury, Thomas Ristenpart
2017/809 (PDF ) High-Precision Arithmetic in Homomorphic Encryption Hao Chen, Kim Laine, Rachel Player, Yuhou Xia
2017/808 (PDF ) On the Untapped Potential of Encoding Predicates by Arithmetic Circuits and Their Applications Shuichi Katsumata
2017/807 (PDF ) FAME: Fast Attribute-based Message Encryption Shashank Agrawal, Melissa Chase
2017/806 (PDF ) May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519 Daniel Genkin, Luke Valenta, Yuval Yarom
2017/805 (PDF ) Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives Raphael Bost, Brice Minaud, Olga Ohrimenko
2017/804 (PDF ) Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method Zheng Li, Wenquan Bi, Xiaoyang Dong, Xiaoyun Wang
2017/803 (PDF ) Role-Based Ecosystem for Design, Development, and Deployment of Secure Multi-Party Data Analytics Applications Andrei Lapets, Kinan Dak Albab, Rawane Issa, Lucy Qin, Mayank Varia, Azer Bestavros, Frederick Jansen
2017/802 (PDF ) New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs Gottfried Herold, Max Hoffmann, Michael Kloo\ss, Carla Ràfols, Andy Rupp
2017/801 (PDF ) Short Attribute-Based Signatures for Arbitrary Turing Machines from Standard Assumptions Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2017/800 (PDF ) Collisions and Semi-Free-Start Collisions for Round-Reduced RIPEMD-160 Fukang Liu, Florian Mendel, Gaoli Wang
2017/799 (PDF ) Practical Multi-party Private Set Intersection from Symmetric-Key Techniques Vladimir Kolesnikov, Naor Matania, Benny Pinkas, Mike Rosulek, Ni Trieu
2017/798 (PDF ) More Efficient Universal Circuit Constructions Daniel Günther, Ágnes Kiss, Thomas Schneider
2017/796 (PDF ) Lightweight Symmetric-Key Hidden Vector Encryption without Pairings Sikhar Patranabis, Debdeep Mukhopadhyay
2017/795 (PDF ) Private Constrained PRFs (and More) from LWE Zvika Brakerski, Rotem Tsabary, Vinod Vaikuntanathan, Hoeteck Wee
2017/794 (PDF ) Anonymous Single-Round Server-Aided Verification Elena Pagnin, Aikaterini Mitrokotsa, Keisuke Tanaka
2017/793 (PDF ) McBits Revisited Tung Chou
2017/792 (PDF ) Gimli, Lord of the Glittering TRS-80 Jean-Marie Chauvet
2017/791 (PDF ) Merged Mining: Curse of Cure? Aljosha Judmayer, Alexei Zamyatin, Nicholas Stifter, Artemios G. Voyiatzis, Edgar Weippl
2017/790 (PDF ) TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation Nico Döttling, Satrajit Ghosh, Jesper Buus Nielsen, Tobias Nilges, Roberto Trifiletti
2017/789 (PDF ) Low-communication parallel quantum multi-target preimage search Gustavo Banegas, Daniel J. Bernstein
2017/788 (PDF ) Attack on AES Implementation Exploiting Publicly-visible Partial Result William Diehl
2017/787 (PDF ) When Are Opaque Predicates Useful? Lukas Zobernig, Steven D. Galbraith, Giovanni Russello
2017/786 (PDF ) A Cryptographic Look at Multi-Party Channels Patrick Eugster, Giorgia Azzurra Marson, Bertram Poettering
2017/785 (PDF ) What about Bob? The Inadequacy of CPA Security for Proxy Reencryption Aloni Cohen
2017/784 (PDF ) Secure Channels and Termination: The Last Word on TLS Colin Boyd, Britta Hale
2017/783 (PDF ) HAL — The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion Marc Fyrbiak, Sebastian Wallat, Pawel Swierczynski, Max Hoffmann, Sebastian Hoppach, Matthias Wilhelm, Tobias Weidlich, Russell Tessier, Christof Paar
2017/782 (PDF ) Efficient Attribute-Based Secure Keyword Search on the Cloud Storage Wanfen Guo, Xiaolei Dong, Zhenfu Cao, Jiachen Shen
2017/781 (PDF ) Lattice-Based Techniques for Accountable Anonymity: Composition of Abstract Stern’s Protocols and Weak PRF with Efficient Protocols from LWR Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu
2017/780 (PDF ) New Algorithms for Solving LPN Bin Zhang, Xinxin Gong
2017/779 (PDF ) Efficient Random Grid Visual Cryptographic Schemes having Essential Members Bibhas Chandra Das, Md Kutubuddin Sardar, Avishek Adhikari
2017/778 (PDF ) MCMix: Anonymous Messaging via Secure Multiparty Computation Nikolaos Alexopoulos, Aggelos Kiayias, Riivo Talviste, Thomas Zacharias
2017/777 (PDF ) Encrypting Messages for Incomplete Chains of Certificates Sanjit Chatterjee, Deepak Garg, Aniket Kate, Tobias Theobald
2017/776 (PDF ) Field lifting for smaller UOV public keys Ward Beullens, Bart Preneel
2017/775 (PDF ) Consensus from Signatures of Work Juan A. Garay, Aggelos Kiayias, Giorgos Panagiotakos
2017/774 (PDF ) Computational problems in supersingular elliptic curve isogenies Steven D. Galbraith, Frederik Vercauteren
2017/773 (PDF ) A Novel Cryptographic Framework for Cloud File Systems and CryFS, a Provably-Secure Construction Sebastian Messmer, Jochen Rill, Dirk Achenbach, Jörn Müller-Quade
2017/772 (PDF ) Locality-Preserving Oblivious RAM Gilad Asharov, T-H. Hubert Chan, Kartik Nayak, Rafael Pass, Ling Ren, Elaine Shi
2017/771 (PDF ) Post-quantum security of the sponge construction Jan Czajkowski, Leon Groot Bruinderink, Andreas Hülsing, Christian Schaffner, Dominique Unruh
2017/770 (PDF ) PAPEETE: Private, Authorized, and Fast Personal Genomic Testing Angelo Massimo Perillo, Emiliano De Cristofaro
2017/769 (PDF ) Malicious-Secure Private Set Intersection via Dual Execution Peter Rindal, Mike Rosulek
2017/768 (PDF ) An Efficient Certificateless Proxy Re-Encryption Scheme without Pairing S. Sharmila Deva Selvi, Arinjita Paul, C. Pandu Rangan
2017/767 (PDF ) Quantum Key-Recovery on full AEZ Xavier Bonnetain
2017/766 (PDF ) GLYPH: A New Instantiation of the GLP Digital Signature Scheme Arjun Chopra
2017/765 (PDF ) Necessary conditions for designing secure stream ciphers with the minimal internal states Vahid Amin Ghafari, Honggang Hu, Mohammadsadegh alizadeh
2017/764 (PDF ) Categorising and Comparing Cluster-Based DPA Distinguishers Xinping Zhou, Carolyn Whitnall, Elisabeth Oswald, Degang Sun, Zhu Wang
2017/763 (PDF ) Improved Fully Homomorphic Encryption without Bootstrapping Masahiro Yagisawa
2017/762 (PDF ) Private Collaborative Neural Network Learning Melissa Chase, Ran Gilad-Bachrach, Kim Laine, Kristin Lauter, Peter Rindal
2017/761 (PDF ) Anti-SAT: Mitigating SAT Attack on Logic Locking Yang Xie, Ankur Srivastava
2017/759 (PDF ) Simple Amortized Proofs of Shortness for Linear Relations over Polynomial Rings Carsten Baum, Vadim Lyubashevsky
2017/758 (PDF ) On Improving Integer Factorization and Discrete Logarithm Computation using Partial Triangulation Fabrice Boudot
2017/757 (PDF ) CAKE: Code-based Algorithm for Key Encapsulation Paulo S. L. M. Barreto, Shay Gueron, Tim Gueneysu, Rafael Misoczki, Edoardo Persichetti, Nicolas Sendrier, Jean-Pierre Tillich
2017/756 (PDF ) Verifiable Private Polynomial Evaluation Xavier Bultel, Manik Lal Das, Hardik Gajera, David Gérault, Matthieu Giraud, Pascal Lafourcade
2017/755 (PDF ) Efficient, Reusable Fuzzy Extractors from LWE Daniel Apon, Chongwon Cho, Karim Eldefrawy, Jonathan Katz
2017/754 (PDF ) Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions Ahto Buldas, Matthias Geihs, Johannes Buchmann
2017/753 (PDF ) CryptHOL: Game-based Proofs in Higher-order Logic David A. Basin, Andreas Lochbihler, S. Reza Sefidgar
2017/752 (PDF ) A Note on Attribute-Based Group Homomorphic Encryption Michael Clear, Ciaran McGoldrick
2017/751 (PDF ) Twisting Lattice and Graph Techniques to Compress Transactional Ledgers Rémi Géraud, David Naccache, Răzvan Roşie
2017/750 (PDF ) Adaptive-Secure VRFs with Shorter Keys from Static Assumptions Răzvan Roşie
2017/749 (PDF ) Searchable Encryption with Optimal Locality: Achieving Sublogarithmic Read Efficiency Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou
2017/748 (PDF ) Efficient reductions in cyclotomic rings - Application to R-LWE based FHE schemes Jean-Claude Bajard, Julien Eynard, Anwar Hasan, Paulo Martins, Leonel Sousa, Vincent Zucca
2017/747 (PDF ) sLiSCP: Simeck-based Permutations for Lightweight Sponge Cryptographic Primitives Riham AlTawy, Raghvendra Rohit, Morgan He, Kalikinkar Mandal, Gangqiang Yang, Guang Gong
2017/746 (PDF ) On the Tightness of Forward-Secure Signature Reductions Michel Abdalla, Fabrice Benhamouda, David Pointcheval
2017/745 (PDF ) A Quantum ``Magic Box'' for the Discrete Logarithm Problem Burton S. Kaliski Jr.
2017/744 (PDF ) Binary Hash Tree based Certificate Access Management Virendra Kumar, Jonathan Petit, William Whyte
2017/743 (PDF ) Cryptanalysis of 22 1/2 rounds of Gimli Mike Hamburg
2017/742 (PDF ) Cryptanalysis of Compact-LWE Jonathan Bootle, Mehdi Tibouchi
2017/740 (PDF ) Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures -- Profiling Attacks without Pre-Processing -- Eleonora Cagli, Cécile Dumas, Emmanuel Prouff
2017/738 (PDF ) Private Intersection-Sum Protocol with Applications to Attributing Aggregate Ad Conversions Mihaela Ion, Ben Kreuter, Erhan Nergiz, Sarvar Patel, Shobhit Saxena, Karn Seth, David Shanahan, Moti Yung
2017/737 (PDF ) SecReach: Secure Reachability Computation on Encrypted Location Check-in Data Hanyu Quan, Boyang Wang, Iraklis Leontiadis, Ming Li, Yuqing Zhang
2017/736 (PDF ) SGX Remote Attestation is not Sufficient Yogesh Swami
2017/735 (PDF ) Faster Bootstrapping with Multiple Addends TanPing ZHOU, XiaoYuan YANG, LongFei LIU, Wei ZHANG, YiTao DING
2017/734 (PDF ) Round Optimal Concurrent Non-Malleability from Polynomial Hardness Dakshita Khurana
2017/733 (PDF ) Decoding Generalized Reed-Solomon Codes and Its Application to RLCE Encryption Scheme Yongge Wang
2017/732 (PDF ) Privacy-Preserving Ridge Regression Without Garbled Circuits Marc Joye
2017/731 (PDF ) Revisiting Difficulty Control for Blockchain Systems Dmitry Meshkov, Alexander Chepurnoy, Marc Jansen
2017/730 (PDF ) Second Order Statistical Behavior of LLL and BKZ Yang Yu, Léo Ducas
2017/729 (PDF ) Success Probability of Multiple/Multidimensional Linear Cryptanalysis Under General Key Randomisation Hypotheses Subhabrata Samajder, Palash Sarkar
2017/728 (PDF ) Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems Giulia Traverso, Carlos Garcia Cordero, Mehrdad Nojoumian, Reza Azarderakhsh, Denise Demirel, Sheikh Mahbub Habib, Johannes Buchmann
2017/727 (PDF ) A note on the implementation of the Number Theoretic Transform Michael Scott
2017/726 (PDF ) Proposal of primitive polynomials for Linux kernel PRNG David FONTAINE, Olivier VIVOLO
2017/725 (PDF ) AS$^3$: Adaptive Social Secret Sharing for Distributed Storage Systems Giulia Traverso, Denise Demirel, Sheikh Mahbub Habib, Johannes Buchmann
2017/724 (PDF ) Dynamic and Verifiable Hierarchical Secret Sharing Giulia Traverso, Denise Demirel, Johannes Buchmann
2017/723 (PDF ) An Equivalence Between Attribute-Based Signatures and Homomorphic Signatures, and New Constructions for Both Rotem Tsabary
2017/722 (PDF ) A Simpler Rate-Optimal CPIR Protocol Helger Lipmaa, Kateryna Pavlyk
2017/721 (PDF ) On Making U2F Protocol Leakage-Resilient via Re-keying Donghoon Chang, Sweta Mishra, Somitra Kumar Sanadhya, Ajit Pratap Singh
2017/720 (PDF ) Computing Low-Weight Discrete Logarithms Bailey Kacsmar, Sarah Plosker, Ryan Henry
2017/719 (PDF ) Efficient Proactive Secret Sharing Jacqueline Brendel, Denise Demirel
2017/718 (PDF ) Conditionally Secure Secrecy Computation using Secret Sharing Scheme for n<2k-1 (full paper) Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura
2017/717 (PDF ) Fault Attacks on XEX Mode with Application to certain Authenticated Encryption Modes Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong
2017/716 (PDF ) Anonymous Post-Quantum Cryptocash Huang Zhang, Fangguo Zhang, Haibo Tian, Man Ho Au
2017/715 (PDF ) Privacy-Preserving Deep Learning via Additively Homomorphic Encryption Le Trieu Phong, Yoshinori Aono, Takuya Hayashi, Lihua Wang, Shiho Moriai
2017/714 (PDF ) The Edited Truth Shafi Goldwasser, Saleet Klein, Daniel Wichs
2017/713 (PDF ) More is Less: On the End-to-End Security of Group Chats in Signal, WhatsApp, and Threema Paul Rösler, Christian Mainka, Jörg Schwenk
2017/712 (PDF ) On desynchronised El Gamal algorithm Vasyl Ustimenko
2017/711 (PDF ) Composable Masking Schemes in the Presence of Physical Defaults and the Robust Probing Model Sebastian Faust, Vincent Grosso, Santos Merino Del Pozo, Clara Paglialonga, François-Xavier Standaert
2017/710 (PDF ) Distributed Computing with Channel Noise Abhinav Aggarwal, Varsha Dani, Thomas P. Hayes, Jared Saia
2017/709 (PDF ) spKEX: An optimized lattice-based key exchange Sauvik Bhattacharya, Oscar Garcia-Morchon, Ronald Rietman, Ludo Tolhuizen
2017/708 (PDF ) Reconsidering the Security Bound of AES-GCM-SIV Tetsu Iwata, Yannick Seurin
2017/707 (PDF ) Privacy-Preserving Ridge Regression on Distributed Data Irene Giacomelli, Somesh Jha, C. David Page, Kyonghwan Yoon
2017/706 (PDF ) SCATTER : A New Dimension in Side-Channel Hugues Thiebeauld, Georges Gagnerot, Antoine Wurcker, Christophe Clavier
2017/705 (PDF ) Multi-Hop Distance Estimation: How Far are You? Aikaterini Mitrokotsa, Cristina Onete, Elena Pagnin, Mahesh Perera
2017/704 (PDF ) A Key Backup Scheme Based on Bitcoin Zhongxiang Zheng, Chunhuan Zhao, Haining Fan, Xiaoyun Wang
2017/703 (PDF ) Optimally Sound Sigma Protocols Under DCRA Helger Lipmaa
2017/702 (PDF ) Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation Shay Gueron, Yehuda Lindell
2017/701 (PDF ) Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson
2017/700 (PDF ) Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability Johannes Buchmann, Denise Demirel, Lucas Schabhüser, Patrick Struck
2017/699 (PDF ) Runtime Code Polymorphism as a Protection Against Side Channel Attacks Damien Couroussé, Thierno Barry, Bruno Robisson, Philippe Jaillon, Olivier Potin, Jean-Louis Lanet
2017/698 (PDF ) δ-subgaussian Random Variables in Cryptography Sean Murphy, Rachel Player
2017/697 (PDF ) On Internal Re-keying Liliya R. Ahmetzyanova, Evgeny K. Alekseev, Igor B. Oshkin, Stanislav V. Smyshlyaev
2017/696 (PDF ) A Humble Theory and Application for Logic Encryption Hai Zhou
2017/695 (PDF ) Updatable Tokenization: Formal Definitions and Provably Secure Constructions Christian Cachin, Jan Camenisch, Eduarda Freire-Stoegbuchner, Anja Lehmann
2017/694 (PDF ) Atomically Trading with Roger: Gambling on the success of a hardfork Patrick McCorry, Ethan Heilman, Andrew Miller
2017/693 (PDF ) Cryptanalysis of Deoxys and its Internal Tweakable Block Ciphers Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song
2017/692 (PDF ) Towards Characterizing Securely Computable Two-Party Randomized Functions Deepesh Data, Manoj Prabhakaran
2017/691 (PDF ) Universal Forgery and Key Recovery Attacks: Application to FKS, FKD and Keyak Fanbao Liu, Fengmei Liu
2017/690 (PDF ) High Performance Post-Quantum Key Exchange on FPGAs Po-Chun Kuo, Wen-Ding Li, Yu-Wei Chen, Yuan-Che Hsu, Bo-Yuan Peng, Chen-Mou Cheng, Bo-Yin Yang
2017/689 (PDF ) On the security of HMFEv Yasufumi Hashimoto
2017/688 (PDF ) Quantum Collision-Finding in Non-Uniform Random Functions Marko Balogh, Edward Eaton, Fang Song
2017/686 (PDF ) On the Necessity of a Prescribed Block Validity Consensus: Analyzing Bitcoin Unlimited Mining Protocol Ren Zhang, Bart Preneel
2017/685 (PDF ) Compact-LWE: Enabling Practically Lightweight Public Key Encryption for Leveled IoT Device Authentication Dongxi Liu, Nan Li, Jongkil Kim, Surya Nepal
2017/684 (PDF ) Z-Channel: Scalable and Efficient Scheme in Zerocash Yuncong Zhang, Yu Long, Zhen Liu, Zhiqiang Liu, Dawu Gu
2017/683 (PDF ) Efficient Privacy-Preserving General Edit Distance and Beyond Ruiyu Zhu, Yan Huang
2017/682 (PDF ) Conditional Blind Signatures Alexandros Zacharakis, Panagiotis Grontas, Aris Pagourtzis
2017/681 (PDF ) Logical loophole in random 3-bit sequence generator Alexandre de Castro
2017/680 (PDF ) SOFIA: MQ-based signatures in the QROM Ming-Shing Chen, Andreas Hülsing, Joost Rijneveld, Simona Samardjiska, Peter Schwabe
2017/679 (PDF ) Searchable Encryption with Access Control Nils Löken
2017/678 (PDF ) Differential Fault Attack on Grain v1, ACORN v3 and Lizard Akhilesh Anilkumar Siddhanti, Santanu Sarkar, Subhamoy Maitra, Anupam Chattopadhyay
2017/677 (PDF ) Faster Unbalanced Private Set Intersection Amanda Cristina Davi Resende, Diego de Freitas Aranha
2017/676 (PDF ) Dynamic Verifiable Encrypted Keyword Search Using Bitmap Index and Homomorphic MAC Rajkumar Ramasamy, S. Sree Vivek, Praveen George, Bharat S. Rawal Kshatriya
2017/675 (PDF ) Memory-Tight Reductions Benedikt Auerbach, David Cash, Manuel Fersch, Eike Kiltz
2017/674 (PDF ) Transparent Memory Encryption and Authentication Mario Werner, Thomas Unterluggauer, Robert Schilling, David Schaffenrath, Stefan Mangard
2017/673 (PDF ) Differential Fault Analysis Automation Sayandeep Saha, Ujjawal Kumar, Debdeep Mukhopadhyay, Pallab Dasgupta
2017/672 (PDF ) Coding for interactive communication beyond threshold adversaries Anat Paskin-Cherniavsky, Slava Radune
2017/671 (PDF ) Guru: Universal Reputation Module for Distributed Consensus Protocols Alex Biryukov, Daniel Feher, Dmitry Khovratovich
2017/670 (PDF ) Private Set Intersection for Unequal Set Sizes with Mobile Applications Ágnes Kiss, Jian Liu, Thomas Schneider, N. Asokan, Benny Pinkas
2017/669 (PDF ) Speeding up Elliptic Curve Scalar Multiplication without Precomputation Kwang Ho Kim, Junyop Choe, Song Yun Kim, Namsu Kim, Sekung Hong
2017/668 (PDF ) Spot the Black Hat in a Dark Room: Parallelized Controlled Access Searchable Encryption on FPGAs Sikhar Patranabis, Debdeep Mukhopadhyay
2017/667 (PDF ) High-speed key encapsulation from NTRU Andreas Hülsing, Joost Rijneveld, John M. Schanck, Peter Schwabe
2017/666 (PDF ) On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees Katriel Cohn-Gordon, Cas Cremers, Luke Garratt, Jon Millican, Kevin Milner
2017/665 (PDF ) Lower bounds on communication for multiparty computation of multiple «AND» instances with secret sharing Michael Raskin
2017/664 (PDF ) Message Franking via Committing Authenticated Encryption Paul Grubbs, Jiahui Lu, Thomas Ristenpart
2017/663 (PDF ) Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives Thomas Unterluggauer, Mario Werner, Stefan Mangard
2017/662 (PDF ) The problem with the SURF scheme Thomas Debris-Alazard, Nicolas Sendrier, Jean-Pierre Tillich
2017/661 (PDF ) MuSE: Multimodal Searchable Encryption for Cloud Applications Bernardo Ferreira, João Leitão, Henrique Domingos
2017/660 (PDF ) Profiling Good Leakage Models For Masked Implementations Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou
2017/659 (PDF ) Forward-Secure Searchable Encryption on Labeled Bipartite Graphs Russell W. F. Lai, Sherman S. M. Chow
2017/658 (PDF ) Privacy for Targeted Advertising Avradip Mandal, John Mitchell, Hart Montgomery, Arnab Roy
2017/657 (PDF ) CCA-secure Predicate Encryption from Pair Encoding in Prime Order Groups: Generic and Efficient Sanjit Chatterjee, Sayantan Mukherjee, Tapas Pandit
2017/656 (PDF ) A Scalable Proof-of-Stake Blockchain in the Open Setting (or, How to Mimic Nakamoto's Design via Proof-of-Stake) Lei Fan, Hong-Sheng Zhou
2017/655 (PDF ) A Real-time Inversion Attack on the GMR-2 Cipher Used in the Satellite Phones Jiao Hu, Ruilin Li, Chaojing Tang
2017/654 (PDF ) A Secure and Private Billing Protocol for Smart Metering Tom Eccles, Basel Halak
2017/653 (PDF ) Universal Forgery with Birthday Paradox: Application to Blockcipher-based Message Authentication Codes and Authenticated Encryptions Fanbao Liu, Fengmei Liu
2017/652 (PDF ) Pseudorandom Functions: Three Decades Later Andrej Bogdanov, Alon Rosen
2017/650 (PDF ) Efficient Public Trace and Revoke from Standard Assumptions Shweta Agrawal, Sanjay Bhattacherjee, Duong Hieu Phan, Damien Stehle, Shota Yamada
2017/649 (PDF ) Blockcipher-based Authenticated Encryption: How Small Can We Go? Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi
2017/648 (PDF ) CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds Kirill Nikitin, Eleftherios Kokoris-Kogias, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, Ismail Khoffi, Justin Cappos, Bryan Ford
2017/647 (PDF ) A TMDTO Attack Against Lizard Subhamoy Maitra, Nishant Sinha, Akhilesh Siddhanti, Ravi Anand, Sugata Gangopadhyay
2017/646 (PDF ) Rational Trust Modeling Mehrdad Nojoumian
2017/645 (PDF ) SPHINCS-Simpira: Fast Stateless Hash-based Signatures with Post-quantum Security Shay Gueron, Nicky Mouha
2017/643 (PDF ) Private Data Aggregation on a Budget Morten Dahl, Valerio Pastro, Mathieu Poumeyrol
2017/642 (PDF ) Reducing Multi-Secret Sharing Problem to Sharing a Single Secret Based on Cellular Automata Nasrollah Pakniat, Mahnaz Noroozi, Ziba Eslami
2017/641 (PDF ) Integer Version of Ring-LWE and its Applications Gu Chunsheng
2017/640 (PDF ) Non-Interactive Provably Secure Attestations for Arbitrary RSA Prime Generation Algorithms Fabrice Benhamouda, Houda Ferradi, Rémi Géraud, David Naccache
2017/639 (PDF ) One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation Jan Camenisch, Liqun Chen, Manu Drijvers, Anja Lehmann, David Novick, Rainer Urian
2017/638 (PDF ) From Single-Key to Collusion-Resistant Secret-Key Functional Encryption by Leveraging Succinctness Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka
2017/637 (PDF ) Very High Order Masking: Efficient Implementation and Security Evaluation Anthony Journault, François-Xavier Standaert
2017/636 (PDF ) Implementing 128-bit Secure MPKC Signatures Ming-Shing Chen, Wen-Ding Li, Bo-Yuan Peng, Bo-Yin Yang, Chen-Mou Cheng
2017/635 (PDF ) Perun: Virtual Payment Hubs over Cryptocurrencies Stefan Dziembowski, Lisa Eckey, Sebastian Faust, Daniel Malinowski
2017/634 (PDF ) CRYSTALS -- Kyber: a CCA-secure module-lattice-based KEM Joppe Bos, Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, Gregor Seiler, Damien Stehlé
2017/633 (PDF ) CRYSTALS -- Dilithium: Digital Signatures from Module Lattices Leo Ducas, Tancrede Lepoint, Vadim Lyubashevsky, Peter Schwabe, Gregor Seiler, Damien Stehle
2017/632 (PDF ) Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures Dahmun Goudarzi, Matthieu Rivain, Damien Vergnaud, Srinivas Vivek
2017/631 (PDF ) Certifying Trapdoor Permutations, Revisited Ran Canetti, Amit Lichtenberg
2017/630 (PDF ) Gimli: a cross-platform permutation Daniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat Costa Massolino, Florian Mendel, Kashif Nawaz, Tobias Schneider, Peter Schwabe, François-Xavier Standaert, Yosuke Todo, Benoît Viguier
2017/629 (PDF ) A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks Romain Poussier, Yuanyuan Zhou, François-Xavier Standaert
2017/628 (PDF ) Middle-Product Learning With Errors Miruna Rosca, Amin Sakzad, Ron Steinfeld, Damien Stehle
2017/627 (PDF ) Sliding right into disaster: Left-to-right sliding windows leak Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal, Yuval Yarom
2017/626 (PDF ) CycSAT: SAT-Based Attack on Cyclic Logic Encryptions Hai Zhou, Ruifeng Jiang, Shuyu Kong
2017/625 (PDF ) How to Break Secure Boot on FPGA SoCs through Malicious Hardware Nisha Jacob, Johann Heyszl, Andreas Zankl, Carsten Rolfes, Georg Sigl
2017/624 (PDF ) Fast Leakage Assessment Oscar Reparaz, Benedikt Gierlichs, Ingrid Verbauwhede
2017/623 (PDF ) Back to Massey: Impressively fast, scalable and tight security evaluation tools Marios O. Choudary, P. G. Popescu
2017/622 (PDF ) GIFT: A Small Present Subhadeep Banik, Sumit Kumar Pandey, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo
2017/621 (PDF ) Novel Bypass Attack and BDD-based Tradeoff Analysis Against all Known Logic Locking Attacks Xiaolin Xu, Bicky Shakya, Mark M. Tehranipoor, Domenic Forte
2017/620 (PDF ) The Algebraic Group Model and its Applications Georg Fuchsbauer, Eike Kiltz, Julian Loss
2017/619 (PDF ) Black-Box Constructions of Signature Schemes in the Bounded Leakage Setting Qiong Huang, Jianye Huang
2017/618 (PDF ) CacheZoom: How SGX Amplifies The Power of Cache Attacks Ahmad Moghimi, Gorka Irazoqui, Thomas Eisenbarth
2017/617 (PDF ) Secure Arithmetic Computation with Constant Computational Overhead Benny Applebaum, Ivan Damgård, Yuval Ishai, Michael Nielsen, Lior Zichron
2017/616 (PDF ) Statement Voting Bingsheng Zhang, Hong-Sheng Zhou
2017/615 (PDF ) A Framework to Select Parameters for Lattice-Based Cryptography Nabil Alkeilani Alkadri, Johannes Buchmann, Rachid El Bansarkhani, Juliane Krämer
2017/614 (PDF ) Brute–Force Search Strategies for Single–Trace and Few–Traces Template Attacks on the DES Round Keys of a Recent Smart Card Mathias Wagner, Stefan Heyse, Charles Guillemet
2017/613 (PDF ) Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications Hocheol Shin, Dohyun Kim, Yujin Kwon, Yongdae Kim
2017/612 (PDF ) Large Modulus Ring-LWE $\geq$ Module-LWE Martin R. Albrecht, Amit Deo
2017/611 (PDF ) Multi-Rate Threshold FlipThem David Leslie, Chris Sherfield, Nigel P. Smart
2017/610 (PDF ) Differential Attacks: Using Alternative Operations Céline Blondeau, Roberto Civino, Massimiliano Sala
2017/609 (PDF ) On the discrete logarithm problem for prime-field elliptic curves Alessandro Amadori, Federico Pintore, Massimiliano Sala
2017/608 (PDF ) Your Rails Cannot Hide From Localized EM: How Dual-Rail Logic Fails on FPGAs Vincent Immler, Robert Specht, Florian Unterstein
2017/607 (PDF ) Leighton-Micali Hash-Based Signatures in the Quantum Random-Oracle Model Edward Eaton
2017/606 (PDF ) Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge Johannes Buchmann, Niklas Büscher, Florian Göpfert, Stefan Katzenbeisser, Juliane Krämer, Daniele Micciancio, Sander Siim, Christine van Vredendaal, Michael Walter
2017/605 (PDF ) Unlinkable and Strongly Accountable Sanitizable Signatures from Verifiable Ring Signatures Xavier Bultel, Pascal Lafourcade
2017/604 (PDF ) A Modular Analysis of the Fujisaki-Okamoto Transformation Dennis Hofheinz, Kathrin Hövelmanns, Eike Kiltz
2017/603 (PDF ) Cryptanalytic Time-Memory Tradeoff for Password Hashing Schemes Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya
2017/602 (PDF ) A multi-party protocol for constructing the public parameters of the Pinocchio zk-SNARK Sean Bowe, Ariel Gabizon, Matthew D. Green
2017/601 (PDF ) Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme Wei Dai, Yarkın Doröz, Yuriy Polyakov, Kurt Rohloff, Hadi Sajjadpour, Erkay Savaş, Berk Sunar
2017/600 (PDF ) Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives -- Applications to AES, PRESENT and SKINNY Jeremy Jean, Amir Moradi, Thomas Peyrin, Pascal Sasdrich
2017/599 (PDF ) A Subversion-Resistant SNARK Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Michal Zajac
2017/598 (PDF ) Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms Martin Roetteler, Michael Naehrig, Krysta M. Svore, Kristin Lauter
2017/597 (PDF ) Round Optimal Concurrent MPC via Strong Simulation Saikrishna Badrinarayanan, Vipul Goyal, Abhishek Jain, Dakshita Khurana, Amit Sahai
2017/596 (PDF ) A Side-Channel Assisted Cryptanalytic Attack Against QcBits Mélissa Rossi, Mike Hamburg, Michael Hutter, Mark E. Marson
2017/595 (PDF ) FPGA-based Key Generator for the Niederreiter Cryptosystem using Binary Goppa Codes Wen Wang, Jakub Szefer, Ruben Niederhagen
2017/594 (PDF ) Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption Robert Primas, Peter Pessl, Stefan Mangard
2017/593 (PDF ) Solving multivariate polynomial systems and an invariant from commutative algebra Alessio Caminata, Elisa Gorla
2017/592 (PDF ) Speeding up lattice sieve with Xeon Phi coprocessor Anja Becker, Dusan Kostic
2017/591 (PDF ) On the Security of Carrier Phase-based Ranging Hildur Olafsdottir, Aanjhan Ranganathan, Srdjan Capkun
2017/590 (PDF ) Constant bandwidth ORAM with small block size using PIR operations Linru Zhang, Gongxian Zeng, Yuechen Chen, Siu-Ming Yiu, Nairen Cao, Zheli Liu
2017/589 (PDF ) An Attempt to Cryptanalyze A Partially Known Cipher Algorithm Juay Guan Hee
2017/588 (PDF ) Renyi Entropy Estimation Revisited Maciej Obremski, Maciej Skorski
2017/587 (PDF ) Subversion-zero-knowledge SNARKs Georg Fuchsbauer
2017/586 (PDF ) Deterministic, Stash-Free Write-Only ORAM Daniel S. Roche, Adam J. Aviv, Seung Geol Choi, Travis Mayberry
2017/585 (PDF ) Internet Voting Using Zcash Pavel Tarasov, Hitesh Tewari
2017/584 (PDF ) Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks Luka Malisa, Kari Kostiainen, Thomas Knell, David Sommer, Srdjan Capkun
2017/582 (PDF ) (Finite) Field Work: Choosing the Best Encoding of Numbers for FHE Computation Angela Jäschke, Frederik Armknecht
2017/581 (PDF ) Time-Memory Trade-offs for Parallel Collision Search Algorithms Monika Trimoska, Sorina Ionica, Gilles Dequen
2017/580 (PDF ) Analysing Relations involving small number of Monomials in AES S- Box Riddhi Ghosal
2017/579 (PDF ) Birthday Attack on Dual EWCDM Mridul Nandi
2017/578 (PDF ) TLS-N: Non-repudiation over TLS Enabling - Ubiquitous Content Signing for Disintermediation Hubert Ritzdorf, Karl Wüst, Arthur Gervais, Guillaume Felley, Srdjan Capkun
2017/577 (PDF ) Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors Steffen Schulz, André Schaller, Florian Kohnhäuser, Stefan Katzenbeisser
2017/576 (PDF ) The Security of SIMON-like Ciphers Against Linear Cryptanalysis Zhengbin Liu, Yongqiang Li, Mingsheng Wang
2017/575 (PDF ) Quantum Collision-Resistance of Non-uniformly Distributed Functions: Upper and Lower Bounds Ehsan Ebrahimi, Dominique Unruh
2017/573 (PDF ) Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake protocol Bernardo David, Peter Gaži, Aggelos Kiayias, Alexander Russell
2017/572 (PDF ) MXPUF: Secure PUF Design against State-of-the-art Modeling Attacks Phuong Ha Nguyen, Durga Prasad Sahoo, Chenglu Jin, Kaleel Mahmood, Marten van Dijk
2017/571 (PDF ) Faster Algorithms for Isogeny Problems using Torsion Point Images Christophe Petit
2017/570 (PDF ) Can You Trust Your Encrypted Cloud? An Assessment of SpiderOakONE’s Security Anders P. K. Dalskov, Claudio Orlandi
2017/569 (PDF ) Enforcing Input Correctness via Certification in Garbled Circuit Evaluation Yihua Zhang, Marina Blanton, Fattaneh Bayatbabolghani
2017/568 (PDF ) Towards Doubly Efficient Private Information Retrieval Ran Canetti, Justin Holmgren, Silas Richelson
2017/567 (PDF ) Can We Access a Database Both Locally and Privately? Elette Boyle, Yuval Ishai, Rafael Pass, Mary Wootters
2017/566 (PDF ) Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services Matteo Campanelli, Rosario Gennaro, Steven Goldfeder, Luca Nizzardo
2017/565 (PDF ) A Formal Foundation for Secure Remote Execution of Enclaves Pramod Subramanyan, Rohit Sinha, Ilia Lebedev, Srinivas Devadas, Sanjit Seshia
2017/564 (PDF ) Performance Counters to Rescue: A Machine Learning based safeguard against Micro-architectural Side-Channel-Attacks Manaar Alam, Sarani Bhattacharya, Debdeep Mukhopadhyay, Sourangshu Bhattacharya
2017/563 (PDF ) Weak is Better: Tightly Secure Short Signatures from Weak PRFs Jacob Alperin-Sheriff, Daniel Apon
2017/562 (PDF ) Making Password Authenticated Key Exchange Suitable For Resource-Constrained Industrial Control Devices Björn Haase, Benoît Labrique
2017/561 (PDF ) Privacy-Free Garbled Circuits for Formulas: Size Zero and Information-Theoretic Yashvanth Kondi, Arpita Patra
2017/560 (PDF ) Notes on the design and analysis of SIMON and SPECK Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, Louis Wingers
2017/559 (PDF ) Human Computing for Handling Strong Corruptions in Authenticated Key Exchange Alexandra Boldyreva, Shan Chen, Pierre-Alain Dupont, David Pointcheval
2017/557 (PDF ) Watermarking Public-key Cryptographic Functionalities and Implementations Foteini Baldimtsi, Aggelos Kiayias, Katerina Samari
2017/556 (PDF ) Multiplication and Division over Extended Galois Field GF($p^q$): A new Approach to find Monic Irreducible Polynomials over any Galois Field GF($p^q$). Sankhanil Dey, Ranjan Ghosh
2017/555 (PDF ) Robust Non-Interactive Multiparty Computation Against Constant-Size Collusion Fabrice Benhamouda, Hugo Krawczyk, Tal Rabin
2017/554 (PDF ) Trapping ECC with Invalid Curve Bug Attacks Renaud Dubois
2017/553 (PDF ) Further Analysis of a Proposed Hash-Based Signature Standard Scott Fluhrer
2017/552 (PDF ) Fast Secure Two-Party ECDSA Signing Yehuda Lindell
2017/551 (PDF ) A Fourier Analysis Based Attack against Physically Unclonable Functions Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert
2017/550 (PDF ) Committed MPC - Maliciously Secure Multiparty Computation from Homomorphic Commitments Tore Kasper Frederiksen, Benny Pinkas, Avishay Yanai
2017/549 (PDF ) ZeroTrace : Oblivious Memory Primitives from Intel SGX Sajin Sasy, Sergey Gorbunov, Christopher W. Fletcher
2017/548 (PDF ) Fully Homomorphic Encryption from the Finite Field Isomorphism Problem Yarkın Doröz, Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman, Berk Sunar, William Whyte, Zhenfei Zhang
2017/547 (PDF ) Security Analysis of an Ultra-lightweight RFID Authentication Protocol for M-commerce Seyed Farhad Aghili, Hamid Mala
2017/546 (PDF ) X509CLOUD - FRAMEWORK FOR A UBIQUITOUS PKI Hitesh Tewari, Arthur Hughes, Stefan Weber, Tomas Barry
2017/545 (PDF ) Resource-efficient OT combiners with active security Ignacio Cascudo, Ivan Damgård, Oriol Farràs, Samuel Ranellucci
2017/544 (PDF ) Securing Abe's Mix-net Against Malicious Verifiers via Witness Indistinguishability Elette Boyle, Saleet Klein, Alon Rosen, Gil Segev
2017/543 (PDF ) Identity-Based Encryption from the Diffie-Hellman Assumption Nico Döttling, Sanjam Garg
2017/542 (PDF ) A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing Joanne Woodage, Rahul Chatterjee, Yevgeniy Dodis, Ari Juels, Thomas Ristenpart
2017/541 (PDF ) Lower Bounds on Obfuscation from All-or-Nothing Encryption Primitives Sanjam Garg, Mohammad Mahmoody, Ameer Mohammed
2017/540 (PDF ) Snarky Signatures: \\ Minimal Signatures of Knowledge from Simulation-Extractable SNARKs Jens Groth, Mary Maller
2017/539 (PDF ) Public-Seed Pseudorandom Permutations Pratik Soni, Stefano Tessaro
2017/538 (PDF ) New security notions and feasibility results for authentication of quantum data Sumegha Garg, Henry Yuen, Mark Zhandry
2017/537 (PDF ) Information-theoretic Indistinguishability via the Chi-squared Method Wei Dai, Viet Tung Hoang, Stefano Tessaro
2017/536 (PDF ) HACL*: A Verified Modern Cryptographic Library Jean Karim Zinzindohoué, Karthikeyan Bhargavan, Jonathan Protzenko, Benjamin Beurdouche
2017/535 (PDF ) ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication Tetsu Iwata, Kazuhiko Minematsu, Thomas Peyrin, Yannick Seurin
2017/534 (PDF ) Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners Zhenzhen Bao, Lei Wang, Jian Guo, Dawu Gu
2017/533 (PDF ) Quantum non-malleability and authentication Gorjan Alagic, Christian Majenz
2017/532 (PDF ) All-But-Many Lossy Trapdoor Functions from Lattices and Applications Xavier Boyen, Qinyi Li
2017/531 (PDF ) Template Attack vs Bayes Classifier Stjepan Picek, Annelie Heuser, Sylvain Guilley
2017/530 (PDF ) Non-Malleable Codes for Space-Bounded Tampering Sebastian Faust, Kristina Hostakova, Pratyay Mukherjee, Daniele Venturi
2017/529 (PDF ) Non-Full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak Ling Song, Guohong Liao, Jian Guo
2017/528 (PDF ) Componentwise APNness, Walsh uniformity of APN functions and cyclic-additive difference sets Claude Carlet
2017/527 (PDF ) Key Rotation for Authenticated Encryption Adam Everspaugh, Kenneth Paterson, Thomas Ristenpart, Sam Scott
2017/526 (PDF ) Evaluating web PKIs - A Survey Jiangshan Yu, Mark Ryan
2017/525 (PDF ) Kurosawa-Desmedt Meets Tight Security Romain Gay, Dennis Hofheinz, Lisa Kohl
2017/524 (PDF ) Compact Structure-preserving Signatures with Almost Tight Security Masayuki Abe, Dennis Hofheinz, Ryo Nishimaki, Miyako Ohkubo, Jiaxin Pan
2017/523 (PDF ) Short, Invertible Elements in Partially Splitting Cyclotomic Rings and Applications to Lattice-Based Zero-Knowledge Proofs Vadim Lyubashevsky, Gregor Seiler
2017/522 (PDF ) On the Hardness of the Mersenne Low Hamming Ratio Assumption Marc Beunardeau, Aisling Connolly, Rémi Géraud, David Naccache
2017/521 (PDF ) Breaking the FF3 Format-Preserving Encryption Standard Over Small Domains F. Betül Durak, Serge Vaudenay
2017/520 (PDF ) The Price of Low Communication in Secure Multi-Party Computation Juan Garay, Yuval Ishai, Rafail Ostrovsky, Vassilis Zikas
2017/519 (PDF ) Efficient, Constant-Round and Actively Secure MPC: Beyond the Three-Party Case Nishanth Chandran, Juan A. Garay, Payman Mohassel, Satyanarayana Vusirikala
2017/518 (PDF ) qDSA: Small and Secure Digital Signatures with Curve-based Diffie-Hellman Key Pairs Joost Renes, Benjamin Smith
2017/517 (PDF ) PRF-ODH: Relations, Instantiations, and Impossibility Results Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson
2017/516 (PDF ) Characterizations of the differential uniformity of vectorial functions by the Walsh transform Claude Carlet
2017/515 (PDF ) Be Adaptive, Avoid Overcommitting Zahra Jafargholi, Chethan Kamath, Karen Klein, Ilan Komargodski, Krzysztof Pietrzak, Daniel Wichs
2017/514 (PDF ) Identity-based Encryption from Codes with Rank Metric Philippe Gaborit, Adrien Hauteville, Duong Hieu Phan, Jean-Pierre Tillich
2017/513 (PDF ) Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor $p^\alpha q^\beta$ Patrick Holzer, Thomas Wunderer
2017/511 (PDF ) State of the Art in Lightweight Symmetric Cryptography Alex Biryukov, Leo Perrin
2017/510 (PDF ) Hedging Public-Key Encryption in the Real World Alexandra Boldyreva, Christopher Patton, Thomas Shrimpton
2017/509 (PDF ) Quantum Security of NMAC and Related Constructions Fang Song, Aaram Yun
2017/508 (PDF ) Generalized Distinguishing Attack: A New Cryptanalysis of AES-like Permutations Victor Cauchois, Clément Gomez, Reynald Lercier
2017/507 (PDF ) Inverted Leftover Hash Lemma Maciej Obremski, Maciej Skórski
2017/505 (PDF ) Side-Channel Attacks on BLISS Lattice-Based Signatures -- Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers Thomas Espitau, Pierre-Alain Fouque, Benoit Gerard, Mehdi Tibouchi
2017/504 (PDF ) A simple and compact algorithm for SIDH with arbitrary degree isogenies Craig Costello, Huseyin Hisil
2017/503 (PDF ) Encryption Switching Protocols Revisited: Switching modulo $p$ Guilhem Castagnos, Laurent Imbert, Fabien Laguillaumie
2017/502 (PDF ) DeepSecure: Scalable Provably-Secure Deep Learning Bita Darvish Rouhani, M. Sadegh Riazi, Farinaz Koushanfar
2017/501 (PDF ) A Formal Treatment of Multi-key Channels Felix Günther, Sogol Mazaheri
2017/500 (PDF ) Algebraic XOR-RKA-Secure Pseudorandom Functions from Post-Zeroizing Multilinear Maps Michel Abdalla, Fabrice Benhamouda, Alain Passelègue
2017/499 (PDF ) Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample Fuchun Guo, Rongmao Chen, Willy Susilo, Jianchang Lai, Guomin Yang, Yi Mu
2017/498 (PDF ) Full-State Keyed Duplex With Built-In Multi-User Support Joan Daemen, Bart Mennink, Gilles Van Assche
2017/497 (PDF ) Time-Memory Tradeoff Attacks on the MTP Proof-of-Work Scheme Itai Dinur, Niv Nadler
2017/496 (PDF ) Modes of Operation Suitable for Computing on Encrypted Data Dragos Rotaru, Nigel P. Smart, Martijn Stam
2017/495 (PDF ) Multi-Key Authenticated Encryption with Corruptions: Reductions are Lossy Tibor Jager, Martijn Stam, Ryan Stanley-Oakes, Bogdan Warinschi
2017/494 (PDF ) A Reaction Attack on the QC-LDPC McEliece Cryptosystem Tomas Fabsic, Viliam Hromada, Paul Stankovski, Pavol Zajac, Qian Guo, Thomas Johansson
2017/493 (PDF ) Robust Fuzzy Extractors and Helper Data Manipulation Attacks Revisited: Theory vs Practice Georg T. Becker
2017/492 (PDF ) Reducing Communication Channels in MPC Marcel Keller, Dragos Rotaru, Nigel P. Smart, Tim Wood
2017/491 (PDF ) Laconic Oblivious Transfer and its Applications Chongwon Cho, Nico Döttling, Sanjam Garg, Divya Gupta, Peihan Miao, Antigoni Polychroniadou
2017/490 (PDF ) To BLISS-B or not to be - Attacking strongSwan's Implementation of Post-Quantum Signatures Peter Pessl, Leon Groot Bruinderink, Yuval Yarom
2017/489 (PDF ) Multi Collision Resistant Hash Functions and their Applications Itay Berman, Akshay Degwekar, Ron D. Rothblum, Prashant Nalini Vasudevan
2017/488 (PDF ) Multi-Collision Resistance: A Paradigm for Keyless Hash Functions Nir Bitansky, Yael Tauman Kalai, Omer Paneth
2017/487 (PDF ) New Linear Attacks on Block Cipher GOST Yi LU
2017/486 (PDF ) Collision Resistant Hashing for Paranoids: Dealing with Multiple Collisions Ilan Komargodski, Moni Naor, Eylon Yogev
2017/485 (PDF ) Authenticating compromisable storage systems Jiangshan Yu, Mark Ryan, Liqun Chen
2017/484 (PDF ) Cryptanalysis of Middle Lattice on the Overstretched NTRU Problem for General Modulus Polynomial Jung Hee Cheon, Minki Hhan, Changmin Lee
2017/483 (PDF ) A multi-start heuristic for multiplicative depth minimization of boolean circuits Sergiu Carpov, Pascal Aubry, Renaud Sirdey
2017/482 (PDF ) On the Statistical Leak of the GGH13 Multilinear Map and some Variants Léo Ducas, Alice Pellet--Mary
2017/481 (PDF ) A New Public-Key Cryptosystem via Mersenne Numbers Divesh Aggarwal, Antoine Joux, Anupam Prakash, Miklos Santha
2017/480 (PDF ) Sharper Bounds in Lattice-Based Cryptography using the Rényi Divergence Thomas Prest
2017/479 (PDF ) Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions Keita Emura
2017/478 (PDF ) Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds Anne Canteaut, Eran Lambooij, Samuel Neves, Shahram Rasoolzadeh, Yu Sasaki, Marc Stevens
2017/477 (PDF ) Constrained Keys for Invertible Pseudorandom Functions Dan Boneh, Sam Kim, David J. Wu
2017/476 (PDF ) Forward-Security under Continual Leakage Mihir Bellare, Adam O'Neill, Igors Stepanovs
2017/475 (PDF ) Security of Even--Mansour Ciphers under Key-Dependent Messages Pooya Farshim, Louiza Khati, Damien Vergnaud
2017/474 (PDF ) Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security Bart Mennink
2017/473 (PDF ) Encrypted Davies-Meyer and Its Dual: Towards Optimal Security Using Mirror Theory Bart Mennink, Samuel Neves
2017/472 (PDF ) A Unified Framework for Secure Search Over Encrypted Cloud Data Cengiz Orencik, Erkay Savas, Mahmoud Alewiwi
2017/471 (PDF ) Total Break of the Fully Homomorphic Multivariate Encryption Scheme of 2017/458: Decryption can not be of low degree Jacob Alperin-Sheriff, Jintai Ding, Albrecht Petzoldt, Daniel Smith Tone
2017/470 (PDF ) On the Relation Between SIM and IND-RoR Security Models for PAKEs José Becerra, Vincenzo Iovino, Dimiter Ostrev, Marjan Skrobot
2017/469 (PDF ) Short CCA-Secure Attribute-Based Encryption Hiroaki Anada, Seiko Arita
2017/468 (PDF ) Why Your Encrypted Database Is Not Secure Paul Grubbs, Thomas Ristenpart, Vitaly Shmatikov
2017/467 (PDF ) Access Control Encryption for General Policies from Standard Assumptions Sam Kim, David J. Wu
2017/466 (PDF ) Tweakable Blockciphers for Efficient Authenticated Encryptions with Beyond the Birthday-Bound Security Yusuke Naito
2017/465 (PDF ) Lelantos: A Blockchain-based Anonymous Physical Delivery System Riham AlTawy, Muhammad ElSheikh, Amr M. Youssef, Guang Gong
2017/464 (PDF ) On the Structure of Unconditional UC Hybrid Protocols Mike Rosulek, Morgan Shirley
2017/463 (PDF ) Proving Resistance against Invariant Attacks: How to Choose the Round Constants Christof Beierle, Anne Canteaut, Gregor Leander, Yann Rotella
2017/462 (PDF ) Leakage-Resilient Tweakable Encryption from One-Way Functions Suvradip Chakraborty, Chester Rebeiro, Debdeep Mukhopadhyay, C. Pandu Rangan
2017/461 (PDF ) Security Definitions For Hash Functions: Combining UCE and Indifferentiability Daniel Jost, Ueli Maurer
2017/460 (PDF ) Transitioning to a Quantum-Resistant Public Key Infrastructure Nina Bindel, Udyani Herath, Matthew McKague, Douglas Stebila
2017/459 (PDF ) Security Analysis of Arbiter PUF and Its Lightweight Compositions Under Predictability Test Phuong Ha Nguyen, Durga Prasad Sahoo, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay
2017/457 (PDF ) Universal Construction of Cheater-Identifiable Secret Sharing Against Rushing Cheaters without Honest Majority Masahito Hayashi, Takeshi Koshiba
2017/456 (PDF ) Proxy Re-Encryption and Re-Signatures from Lattices Xiong Fan, Feng-Hao Liu
2017/455 (PDF ) Vector Encoding over Lattices and Its Applications Daniel Apon, Xiong Fan, Feng-Hao Liu
2017/454 (PDF ) Algorand: Scaling Byzantine Agreements for Cryptocurrencies Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, Nickolai Zeldovich
2017/453 (PDF ) Subtleties in Security Definitions for Predicate Encryption with Public Index Johannes Blömer, Gennadij Liske
2017/452 (PDF ) Oblivious Neural Network Predictions via MiniONN transformations Jian Liu, Mika Juuti, Yao Lu, N. Asokan
2017/451 (PDF ) Efficient Compilers for After-the-Fact Leakage: from CPA to CCA-2 secure PKE to AKE Suvradip Chakraborty, Goutam Paul, C. Pandu Rangan
2017/450 (PDF ) Privacy-preserving biometric authentication: challenges and directions Elena Pagnin, Aikaterini Mitrokotsa
2017/449 (PDF ) Differentially 4-Uniform Permutations with the Best Known Nonlinearity from Butterflies Shihui Fu, Xiutao Feng, Baofeng Wu
2017/447 (PDF ) Block Chain based Searchable Symmetric Encryption Huige Li, Haibo Tian, Fangguo Zhang
2017/446 (PDF ) Secretly Embedding Trapdoors into Contract Signing Protocols Diana Maimut, George Teseleanu
2017/445 (PDF ) Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures Michael Till Beck, Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
2017/444 (PDF ) CrowdBC: A Blockchain-based Decentralized Framework for Crowdsourcing Ming Li, Jian Weng, Anjia Yang, Wei Lu, Yue Zhang, Lin Hou, Jia-Nan Liu, Yang Xiang, Robert H. Deng
2017/443 (PDF ) Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions Joel Alwen, Jeremiah Blocki, Ben Harsha
2017/442 (PDF ) On the Depth-Robustness and Cumulative Pebbling Cost of Argon2i Jeremiah Blocki, Samson Zhou
2017/441 (PDF ) New Approach to Practical Leakage-Resilient Public-Key Cryptography Suvradip Chakraborty, Janaka Alawatugoda, C. Pandu Rangan
2017/440 (PDF ) Cryptographic Security Analysis of T-310 Nicolas T. Courtois, Klaus Schmeh, Jörg Drobick, Jacques Patarin, Maria-Bristena Oprisanu, Matteo Scarlata, Om Bhallamudi
2017/439 (PDF ) Practically Efficient Secure Single-Commodity Multi-Market Auctions Abdelrahaman Aly, Mathieu Van Vyve
2017/438 (PDF ) GLITCH: A Discrete Gaussian Testing Suite For Lattice-Based Cryptography James Howe, Máire O'Neill
2017/437 (PDF ) Slothful reduction Michael Scott
2017/436 (PDF ) A Uniform Class of Weak Keys for Universal Hash Functions Kaiyan Zheng, Peng Wang
2017/435 (PDF ) Analyzing Multi-Key Security Degradation Atul Luykx, Bart Mennink, Kenneth G. Paterson
2017/434 (PDF ) FourQ on embedded devices with strong countermeasures against side-channel attacks Zhe Liu, Patrick Longa, Geovandro Pereira, Oscar Reparaz, Hwajeong Seo
2017/433 (PDF ) Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions Saikrishna Badrinarayanan, Sanjam Garg, Yuval Ishai, Amit Sahai, Akshay Wadia
2017/432 (PDF ) Statistical and Linear Independence of Binary Random Variables Kaisa Nyberg
2017/431 (PDF ) Understanding RUP Integrity of COLM Nilanjan Datta, Atul Luykx, Bart Mennink, Mridul Nandi
2017/430 (PDF ) Improving TFHE: faster packed homomorphic operations and efficient circuit bootstrapping Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, Malika Izabachène
2017/429 (PDF ) Strengthening Access Control Encryption Christian Badertscher, Christian Matt, Ueli Maurer
2017/428 (PDF ) Optimal Ramp Schemes and Related Combinatorial Objects Douglas R. Stinson
2017/427 (PDF ) Grover Meets Simon - Quantumly Attacking the FX-construction Gregor Leander, Alexander May
2017/426 (PDF ) FHPKE based on multivariate discrete logarithm problem Masahiro Yagisawa
2017/425 (PDF ) Card-Based Protocols Using Unequal Division Shuffles Akihiro Nishimura, Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone
2017/424 (PDF ) HILA5: On Reliability, Reconciliation, and Error Correction for Ring-LWE Encryption Markku-Juhani O. Saarinen
2017/423 (PDF ) Foundations for Actively Secure Card-based Cryptography Alexander Koch, Stefan Walzer
2017/422 (PDF ) PUF+IBE: Blending Physically Unclonable Functions with Identity Based Encryption for Authentication and Key Exchange in IoTs Urbi Chatterjee, Vidya Govindan, Rajat Sadhukhan, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Debashis Mahata, Mukesh Prabhu
2017/421 (PDF ) Exploring Naccache-Stern Knapsack Encryption Éric Brier, Rémi Géraud, David Naccache
2017/420 (PDF ) Construction and Filtration of Lightweight Formalized MDS Matrices Shiyi Zhang, Yongjuan Wang, Yang Gao, Tao Wang
2017/419 (PDF ) Efficient hash maps to \mathbb{G}_2 on BLS curves Alessandro Budroni, Federico Pintore
2017/418 (PDF ) Strong Authenticated Key Exchange with Auxiliary Inputs Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo
2017/417 (PDF ) A Proof-of-Stake protocol for consensus on Bitcoin subchains Massimo Bartoletti, Stefano Lande, Alessandro Sebastian Podda
2017/416 (PDF ) Breaking and Fixing the HB+DB protocol Ioana Boureanu, David Gerault, Pascal Lafourcade, Cristina Onete
2017/415 (PDF ) Towards Practical PFE: An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates Osman Bicer, Muhammed Ali Bingol, Mehmet Sabir Kiraz, Albert Levi
2017/414 (PDF ) Symmetrically and Asymmetrically Hard Cryptography (Full Version) Alex Biryukov, Leo Perrin
2017/413 (PDF ) Correlation Power Analysis Attack against STT-MRAM Based Cyptosystems Abhishek Chakraborty, Ankit Mondal, Ankur Srivastava
2017/412 (PDF ) Improved Attack on Full-round Grain-128 Ximing Fu, Xiaoyun Wang, Jiazhe Chen, Marc Stevens, Xiaoyang Dong
2017/411 (PDF ) A New Algorithm for Inversion mod $p^k$ Çetin Kaya Koç
2017/410 (PDF ) Fast Proxy Re-Encryption for Publish/Subscribe Systems Yuriy Polyakov, Kurt Rohloff, Gyana Sahu, Vinod Vaikuntanthan
2017/409 (PDF ) Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead Satrajit Ghosh, Jesper Buus Nielsen, Tobias Nilges
2017/408 (PDF ) Combinatorial Subset Difference Public Key Broadcast Encryption Scheme for Secure Multicast Jihye Kim, Jiwon Lee, Seunghwa Lee, Hyunok Oh
2017/407 (PDF ) SplitCommit: Implementing and Analyzing Homomorphic UC Commitments Peter Rindal, Roberto Trifiletti
2017/406 (PDF ) OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding Eleftherios Kokoris-Kogias, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, Ewa Syta, Bryan Ford
2017/405 (PDF ) Security Analysis of ``PSLP: Privacy-Preserving Single-Layer Perceptron Learning for e-Healthcare'' Jingjing Wang, Xiaoyu Zhang, Jingjing guo, Jianfeng Wang
2017/404 (PDF ) Short generators without quantum computers: the case of multiquadratics Jens Bauch, Daniel J. Bernstein, Henry de Valence, Tanja Lange, Christine van Vredendaal
2017/403 (PDF ) Condition on composite numbers easily factored with elliptic curve method Masaaki Shirase
2017/402 (PDF ) A New Approach to Round-Optimal Secure Multiparty Computation Prabhanjan Ananth, Arka Rai Choudhuri, Abhishek Jain
2017/401 (PDF ) Synthesis of Adaptive Side-Channel Attacks Quoc-Sang Phan, Lucas Bang, Corina S. Păsăreanu, Pasquale Malacaria, Tevfik Bultan
2017/400 (PDF ) A Leakage-Abuse Attack Against Multi-User Searchable Encryption Cédric Van Rompay, Refik Molva, Melek Önen
2017/399 (PDF ) Practical Evaluation of Masking Software Countermeasures on an IoT processor David McCann, Elisabeth Oswald
2017/398 (PDF ) Post-Quantum Security of Fiat-Shamir Dominique Unruh
2017/397 (PDF ) Efficient One-Time Signatures from Quasi-Cyclic Codes: a Full Treatment Edoardo Persichetti
2017/396 (PDF ) SecureML: A System for Scalable Privacy-Preserving Machine Learning Payman Mohassel, Yupeng Zhang
2017/395 (PDF ) Higher-Order Side-Channel Protected Implementations of Keccak Hannes Gross, David Schaffenrath, Stefan Mangard
2017/394 (PDF ) Double-spending Prevention for Bitcoin zero-confirmation transactions Cristina Pérez-Solà, Sergi Delgado-Segura, Guillermo Navarro-Arribas, Jordi Herrera-Joancomartı́
2017/393 (PDF ) Privacy-Preserving Interdomain Routing at Internet Scale Gilad Asharov, Daniel Demmler, Michael Schapira, Thomas Schneider, Gil Segev, Scott Shenker, Michael Zohner
2017/392 (PDF ) Running compression algorithms in the encrypted domain: a case-study on the homomorphic execution of RLE Sébastien Canard, Sergiu Carpov, Donald Nokam Kuate, Renaud Sirdey
2017/391 (PDF ) Another Look at Success Probability in Linear Cryptanalysis Subhabrata Samajder, Palash Sarkar
2017/390 (PDF ) On the Security of Classic Protocols for Unique Witness Relations Yi Deng, Xuyang Song, Jingyue Yu, Yu Chen
2017/389 (PDF ) Decentralized Blacklistable Anonymous Credentials with Reputation Rupeng Yang, Man Ho Au, Qiuliang Xu, Zuoxia Yu
2017/388 (PDF ) Post-Quantum Key Exchange on ARMv8-A -- A New Hope for NEON made Simple Silvan Streit, Fabrizio De Santis
2017/387 (PDF ) Homomorphically Encrypted Arithmetic Operations over the Integer Ring Chen Xu, Jingwei Chen, Wenyuan Wu, Yong Feng
2017/386 (PDF ) Four Round Secure Computation without Setup Zvika Brakerski, Shai Halevi, Antigoni Polychroniadou
2017/385 (PDF ) Garbled Circuits as Randomized Encodings of Functions: a Primer Benny Applebaum
2017/384 (PDF ) Time-Memory-Data Tradeoff Attacks against Small-State Stream Ciphers Matthias Hamann, Matthias Krause, Willi Meier, Bin Zhang
2017/383 (PDF ) Super-Isolated Elliptic Curves and Abelian Surfaces in Cryptography Travis Scholl
2017/382 (PDF ) A General Degenerate Grouping Power Attack with Specific Application to SIMON and SPECK Steven Cavanaugh
2017/381 (PDF ) Quantum one-way permutation over the finite field of two elements Alexandre de Castro
2017/380 (PDF ) Watermarking Cryptographic Functionalities from Standard Lattice Assumptions Sam Kim, David J. Wu
2017/379 (PDF ) Fault attack on Supersingular Isogeny Cryptosystems Yan Bo Ti
2017/378 (PDF ) Faster Secure Multi-Party Computation of AES and DES Using Lookup Tables Marcel Keller, Emmanuela Orsini, Dragos Rotaru, Peter Scholl, Eduardo Soria-Vazquez, Srinivas Vivek
2017/377 (PDF ) Privacy-Preserving Multi-Party Bartering Secure Against Active Adversaries Stefan Wüller, Ulrike Meyer, Susanne Wetzel
2017/375 (PDF ) Do you need a Blockchain? Karl Wüst, Arthur Gervais
2017/374 (PDF ) Loop-abort faults on supersingular isogeny cryptosystems Alexandre Gélin, Benjamin Wesolowski
2017/373 (PDF ) Fully Dynamic Multi Target Homomorphic Attribute-Based Encryption Ryo Hiromasa, Yutaka Kawai
2017/372 (PDF ) A crossbred algorithm for solving Boolean polynomial systems Antoine Joux, Vanessa Vitse
2017/371 (PDF ) On the Construction of Lightweight Orthogonal MDS Matrices Lijing Zhou, Licheng Wang, Yiru Sun
2017/370 (PDF ) "The Simplest Protocol for Oblivious Transfer'' Revisited Ziya Alper Genç, Vincenzo Iovino, Alfredo Rial
2017/368 (PDF ) Analysis of Toeplitz MDS Matrices Sumanta Sarkar, Habeeb Syed
2017/367 (PDF ) Fork-Free Hybrid Consensus with Flexible Proof-of-Activity Zhiqiang Liu, Shuyang Tang, Sherman S. M. Chow, Zhen Liu, Yu Long
2017/366 (PDF ) BitFlip: A Randomness-Rich Cipher Gideon Samid, Serguei Popov
2017/365 (PDF ) The Complexity of Public-Key Cryptography Boaz Barak
2017/364 (PDF ) Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols Ran Cohen, Sandro Coretti, Juan Garay, Vassilis Zikas
2017/363 (PDF ) TOPPSS: Cost-minimal Password-Protected Secret Sharing based on Threshold OPRF Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu
2017/362 (PDF ) Universally Composable Zero-Knowledge Proof of Membership Jesper Buus Nielsen
2017/361 (PDF ) Indistinguishability Obfuscation for All Circuits from Secret-Key Functional Encryption Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka
2017/360 (PDF ) Provably Secure Three-party Password Authenticated Key Exchange Protocol Based On Ring Learning With Error Dongqing Xu, Debiao He, Kim-Kwang Raymond Choo, Jianhua Chen
2017/359 (PDF ) Conditional Disclosure of Secrets via Non-Linear Reconstruction Tianren Liu, Vinod Vaikuntanathan, Hoeteck Wee
2017/358 (PDF ) Almost Optimal Oblivious Transfer from QA-NIZK Olivier Blazy, Céline Chevalier, Paul Germouty
2017/357 (PDF ) Continuous Non-Malleable Codes in the 8-Split-State Model Divesh Aggarwal, Nico Dottling, Jesper Buus Nielsen, Maciej Obremski, Erick Purwanto
2017/356 (PDF ) XOR of PRPs in a Quantum World Bart Mennink, Alan Szepieniec
2017/355 (PDF ) White-Box Cryptography: Don't Forget About Grey Box Attacks Estuardo Alpirez Bock, Joppe W. Bos, Chris Brzuska, Charles Hubain, Wil Michiels, Cristofaro Mune, Eloi Sanfelix Gonzalez, Philippe Teuwen, Alexander Treff
2017/354 (PDF ) Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts Martin R. Albrecht, Emmanuela Orsini, Kenneth G. Paterson, Guy Peer, Nigel P. Smart
2017/353 (PDF ) Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu
2017/352 (PDF ) A low-resource quantum factoring algorithm Daniel J. Bernstein, Jean-François Biasse, Michele Mosca
2017/351 (PDF ) Post-quantum RSA Daniel J. Bernstein, Nadia Heninger, Paul Lou, Luke Valenta
2017/350 (PDF ) The Montgomery ladder on binary elliptic curves Thomaz Oliveira, Julio López, Francisco Rodríguez-Henríquez
2017/349 (PDF ) LMS vs XMSS: Comparion of two Hash-Based Signature Standards Panos Kampanakis, Scott Fluhrer
2017/348 (PDF ) Removal Attacks on Logic Locking and Camouflaging Techniques Muhammad Yasin, Bodhisatwa Mazumdar, Ozugr Sinanoglu, Jeyavijayan Rajendran
2017/347 (PDF ) Predictive Aging of Reliability of two Delay PUFs Naghmeh Karimi, Jean-Luc Danger, Florent Lozac'h, Sylvain Guilley
2017/346 (PDF ) Some cryptanalytic results on Lizard Subhadeep Banik, Takanori Isobe
2017/345 (PDF ) Mind the Gap: Towards Secure 1st-order Masking in Software Kostas Papagiannopoulos, Nikita Veshchikov
2017/344 (PDF ) DUPLO: Unifying Cut-and-Choose for Garbled Circuits Vladimir Kolesnikov, Jesper Buus Nielsen, Mike Rosulek, Ni Trieu, Roberto Trifiletti
2017/343 (PDF ) Towards a Classification of Non-interactive Computational Assumptions in Cyclic Groups Essam Ghadafi, Jens Groth
2017/342 (PDF ) Multilinear Maps Using a Variant of Ring-LWE Gu Chunsheng
2017/341 (PDF ) Steganography techniques Dragoş Dumitrescu, Ioan-Mihail Stan, Emil Simion
2017/339 (PDF ) ElsieFour: A Low-Tech Authenticated Encryption Algorithm For Human-to-Human Communication Alan Kaminsky
2017/338 (PDF ) A Traceability Analysis of Monero's Blockchain Amrit Kumar, Clément Fischer, Shruti Tople, Prateek Saxena
2017/337 (PDF ) Authentication of Outsourced Linear Function Query with Efficient Updates Gang Sheng, Chunming Tang, Wei Gao, Yunlu Cai, Xing Hu
2017/336 (PDF ) NIST RANDOMNESS TESTS (IN)DEPENDENCE Carmina GEORGESCU, Alina PETRESCU-NITA, Emil SIMION, Antonela TOMA
2017/334 (PDF ) Updating key size estimations for pairings Razvan Barbulescu, Sylvain Duquesne
2017/333 (PDF ) Faster Homomorphic Function Evaluation using Non-Integral Base Encoding Charlotte Bonte, Carl Bootland, Joppe W. Bos, Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
2017/332 (PDF ) Reforgeability of Authenticated Encryption Schemes Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel
2017/331 (PDF ) Optimal attacks on qubit-based Quantum Key Recycling Daan Leermakers, Boris Skoric
2017/330 (PDF ) Distinguisher-Dependent Simulation in Two Rounds and its Applications Abhishek Jain, Yael Tauman Kalai, Dakshita Khurana, Ron Rothblum
2017/329 (PDF ) Maliciously Secure Multi-Client ORAM Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder
2017/328 (PDF ) Evaluating Bernstein-Rabin-Winograd Polynomials Sebati Ghosh, Palash Sarkar
2017/327 (PDF ) MQ Signatures for PKI Alan Szepieniec, Ward Beullens, Bart Preneel
2017/326 (PDF ) Labeled Homomorphic Encryption: Scalable and Privacy-Preserving Processing of Outsourced Data Manuel Barbosa, Dario Catalano, Dario Fiore
2017/325 (PDF ) CHVote Protocol Specification Rolf Haenni, Reto E. Koenig, Philipp Locher, Eric Dubuis
2017/324 (PDF ) Family of PRGs based on Collections of Arithmetic Progressions Ch. Srikanth, C. E. Veni Madhavan
2017/323 (PDF ) Revocable Identity-based Encryption with Bounded Decryption Key Exposure Resistance: Lattice-based Construction and More Atsushi Takayasu, Yohei Watanabe
2017/321 (PDF ) How Fast Can We Obfuscate Using Ideal Graded Encoding Schemes Dingfeng Ye, Peng Liu, Jun Xu
2017/320 (PDF ) Speeding up Huff Form of Elliptic Curves Neriman Gamze Orhon, Huseyin Hisil
2017/319 (PDF ) Embed-Augment-Recover: Function Private Predicate Encryption from Minimal Assumptions in the Public-Key Setting Sikhar Patranabis, Debdeep Mukhopadhyay
2017/317 (PDF ) Solidus: Confidential Distributed Ledger Transactions via PVORM Ethan Cecchetti, Fan Zhang, Yan Ji, Ahmed Kosba, Ari Juels, Elaine Shi
2017/316 (PDF ) Exploring Potential 6LoWPAN Traffic Side Channels Yan Yan, Elisabeth Oswald, Theo Tryfonas
2017/315 (PDF ) Multimodal Indexable Encryption for Mobile Cloud-based Applications (Extended Version) Bernardo Ferreira, Joaão Leitão, Henrique Domingos
2017/314 (PDF ) Post-quantum cryptography---dealing with the fallout of physics success Daniel J. Bernstein, Tanja Lange
2017/312 (PDF ) Limits on Low-Degree Pseudorandom Generators (Or: Sum-of-Squares Meets Program Obfuscation) Boaz Barak, Zvika Brakerski, Ilan Komargodski, Pravesh K. Kothari
2017/311 (PDF ) Constructing Multidimensional Differential Addition Chains and their Applications Aaron Hutchinson, Koray Karabina
2017/310 (PDF ) KDM-Secure Public-Key Encryption from Constant-Noise LPN Shuai Han, Shengli Liu
2017/309 (PDF ) Perfectly Secure Message Transmission Scheme against Rational Adversaries Maiki Fujita, Takeshi Koshiba
2017/308 (PDF ) Faster Gaussian Sampling for Trapdoor Lattices with Arbitrary Modulus Nicholas Genise, Daniele Micciancio
2017/307 (PDF ) Efficient Synchronous Byzantine Consensus Ittai Abraham, Srinivas Devadas, Danny Dolev, Kartik Nayak, Ling Ren
2017/306 (PDF ) Cube Attacks on Non-Blackbox Polynomials Based on Division Property (Full Version) Yosuke Todo, Takanori Isobe, Yonglin Hao, Willi Meier
2017/305 (PDF ) A Zero Knowledge Sumcheck and its Applications Alessandro Chiesa, Michael A. Forbes, Nicholas Spooner
2017/304 (PDF ) Provably Secure NTRUEncrypt over More General Cyclotomic Rings Yang Yu, Guangwu Xu, Xiaoyun Wang
2017/303 (PDF ) Locally Decodable and Updatable Non-Malleable Codes in the Bounded Retrieval Model Dana Dachman-Soled, Mukul Kulkarni, Aria Shahverdi
2017/301 (PDF ) Limits on the Locality of Pseudorandom Generators and Applications to Indistinguishability Obfuscation Alex Lombardi, Vinod Vaikuntanathan
2017/300 (PDF ) Tortoise and Hares Consensus: the Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies Iddo Bentov, Pavel Hubáček, Tal Moran, Asaf Nadler
2017/299 (PDF ) Fast Private Set Intersection from Homomorphic Encryption Hao Chen, Kim Laine, Peter Rindal
2017/298 (PDF ) An Investigation of Sources of Randomness Within Discrete Gaussian Sampling Séamus Brannigan, Neil Smyth, Tobias Oder, Felipe Valencia, Elizabeth O’Sullivan, Tim Güneysu, Francesco Regazzoni
2017/297 (PDF ) A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol Gildas Avoine, Xavier Bultel, Sébastien Gambs, David Gérault, Pascal Lafourcade, Cristina Onete, Jean-Marc Robert
2017/296 (PDF ) Topology-Hiding Computation on all Graphs Adi Akavia, Rio LaVigne, Tal Moran
2017/295 (PDF ) Improved key-reconciliation method Ludo Tolhuizen, Ronald Rietman, Oscar Garcia-Morchon
2017/294 (PDF ) Secure searching of biomarkers through hybrid homomorphic encryption scheme Miran Kim, Yongsoo Song, Jung Hee Cheon
2017/293 (PDF ) Montgomery curves and the Montgomery ladder Daniel J. Bernstein, Tanja Lange
2017/292 (PDF ) Involutory Differentially 4-Uniform Permutations from Known Constructions Shihui Fu, Xiutao Feng
2017/291 (PDF ) How to Achieve Non-Malleability in One or Two Rounds Dakshita Khurana, Amit Sahai
2017/290 (PDF ) Double DIP: Re-Evaluating Security of Logic Encryption Algorithms Yuanqi Shen, Hai Zhou
2017/289 (PDF ) On the Hardness of Trivium and Grain with respect to Generic Time-Memory-Data Tradeoff Attacks Matthias Krause
2017/288 (PDF ) Security of Symmetric Primitives under Incorrect Usage of Keys Pooya Farshim, Claudio Orlandi, Răzvan Roşie
2017/287 (PDF ) Towards Sound and Optimal Leakage Detection Procedure Liwei Zhang, A. Adam Ding, Francois Durvaux, Francois-Xavier Standaert, Yunsi Fei
2017/285 (PDF ) Implementation and Evaluation of Improved Gaussian Sampling for Lattice Trapdoors Kamil Doruk Gür, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan, Erkay Savaş
2017/284 (PDF ) SafeDRP: Yet Another Way Toward Power-Equalized Designs in FPGA Maik Ender, Alexander Wild, Amir Moradi
2017/283 (PDF ) On the Easiness of Turning Higher-Order Leakages into First-Order Thorben Moos, Amir Moradi
2017/282 (PDF ) Collapsing sponges: Post-quantum security of the sponge construction Dominique Unruh
2017/281 (PDF ) Practical Secure Aggregation for Privacy Preserving Machine Learning Keith Bonawitz, Vladimir Ivanov, Ben Kreuter, Antonio Marcedone, H. Brendan McMahan, Sarvar Patel, Daniel Ramage, Aaron Segal, Karn Seth
2017/280 (PDF ) Amortization with Fewer Equations for Proving Knowledge of Small Secrets Rafael del Pino, Vadim Lyubashevsky
2017/279 (PDF ) Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives Melissa Chase, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig, Greg Zaverucha
2017/278 (PDF ) New Observations on Invariant Subspace Attack Yunwen Liu, Vincent Rijmen
2017/277 (PDF ) Minimizing the Complexity of Goldreich's Pseudorandom Generator Alex Lombardi, Vinod Vaikuntanathan
2017/276 (PDF ) Obfuscating Compute-and-Compare Programs under LWE Daniel Wichs, Giorgos Zirdelis
2017/275 (PDF ) Simple and Generic Constructions of Succinct Functional Encryption Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka
2017/274 (PDF ) Lockable Obfuscation Rishab Goyal, Venkata Koppula, Brent Waters
2017/273 (PDF ) Two-Round and Non-Interactive Concurrent Non-Malleable Commitments from Time-Lock Puzzles Huijia Lin, Rafael Pass, Pratik Soni
2017/272 (PDF ) Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks - A Practical Security Evaluation on FPGA Florian Unterstein, Johann Heyszl, Fabrizio De Santis, Robert Specht
2017/271 (PDF ) High Order Masking of Look-up Tables with Common Shares Jean-Sebastien Coron, Franck Rondepierre, Rina Zeitoun
2017/270 (PDF ) Rational Proofs against Rational Verifiers Keita Inasawa, Kenji Yasunaga
2017/269 (PDF ) Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks Okan Seker, Thomas Eisenbarth, Rainer Steinwandt
2017/268 (PDF ) Efficient Sanitizable Signatures without Random Oracles Russell W. F. Lai, Tao Zhang, Sherman S. M. Chow, Dominique Schröder
2017/267 (PDF ) A Masked White-box Cryptographic Implementation for Protecting against Differential Computation Analysis Seungkwang Lee
2017/266 (PDF ) From Higher-Order Differentials to Polytopic Cryptanalysis Tyge Tiessen
2017/265 (PDF ) Enhanced Outsider-anonymous Broadcast Encryption with Subset Difference Revocation Kamalesh Acharya, Ratna Dutta
2017/264 (PDF ) A note on how to (pre-)compute a ladder Thomaz Oliveira, Julio López, Hüseyin Hışıl, Armando Faz-Hernández, Francisco Rodrıíguez-Henrıíquez
2017/263 (PDF ) Bivariate attacks and confusion coefficients Sylvain Guilley, Liran Lerman
2017/262 (PDF ) When It’s All Just Too Much: Outsourcing MPC-Preprocessing Peter Scholl, Nigel P. Smart, Tim Wood
2017/261 (PDF ) Side-channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy? Annelie Heuser, Stjepan Picek, Sylvain Guilley, Nele Mentens
2017/260 (PDF ) Message-Recovery MACs and Verification-Unskippable AE Shoichi Hirose, Yu Sasaki, Kan Yasuda
2017/259 (PDF ) Gaussian Sampling over the Integers: Efficient, Generic, Constant-Time Daniele Micciancio, Michael Walter
2017/258 (PDF ) Pseudorandomness of Ring-LWE for Any Ring and Modulus Chris Peikert, Oded Regev, Noah Stephens-Davidowitz
2017/257 (PDF ) Threshold Fully Homomorphic Encryption Aayush Jain, Peter M. R. Rasmussen, Amit Sahai
2017/256 (PDF ) A Framework for Universally Composable Diffie-Hellman Key Exchange Ralf Kuesters, Daniel Rausch
2017/255 (PDF ) New and Old Limits for AES Known-Key Distinguishers Lorenzo Grassi, Christian Rechberger
2017/254 (PDF ) Towards Easy Key Enumeration Changhai Ou, Degang Sun, Zhu Wang, Xinping Zhou
2017/253 (PDF ) A Modular Security Analysis of EAP and IEEE 802.11 Chris Brzuska, Håkon Jacobsen
2017/252 (PDF ) High-Order Conversion From Boolean to Arithmetic Masking Jean-Sebastien Coron
2017/251 (PDF ) A Lattice-Based Universal Thresholdizer for Cryptographic Systems Dan Boneh, Rosario Gennaro, Steven Goldfeder, Sam Kim
2017/250 (PDF ) Indistinguishability Obfuscation from Trilinear Maps and Block-Wise Local PRGs Huijia Lin, Stefano Tessaro
2017/249 (PDF ) Proof of Luck: an Efficient Blockchain Consensus Protocol Mitar Milutinovic, Warren He, Howard Wu, Maxinder Kanwal
2017/248 (PDF ) IPcore implementation susceptibility: A case study of Low latency ciphers Dillibabu Shanmugam, Ravikumar Selvam, Suganya Annadurai
2017/247 (PDF ) Efficient Multivariate Ring Signature Schemes Mohamed Saied Emam Mohamed, Albrecht Petzoldt
2017/246 (PDF ) An Analysis of FV Parameters Impact Towards its Hardware Acceleration Joël Cathébras, Alexandre Carbon, Renaud Sirdey, Nicolas Ventroux
2017/245 (PDF ) Cache-Base Application Detection in the Cloud Using Machine Learning Berk Gulmezoglu, Thomas Eisenbarth, Berk Sunar
2017/244 (PDF ) Model-counting Approaches For Nonlinear Numerical Constraints Mateus Borges, Quoc-Sang Phan, Antonio Filieri, Corina S. Păsăreanu
2017/243 (PDF ) Key Recovery: Inert and Public Colin Boyd, Xavier Boyen, Christopher Carr, Thomas Haines
2017/242 (PDF ) Full accounting for verifiable outsourcing Riad S. Wahby, Ye Ji, Andrew J. Blumberg, abhi shelat, Justin Thaler, Michael Walfish, Thomas Wies
2017/241 (PDF ) Linear Consistency for Proof-of-Stake Blockchains Erica Blum, Aggelos Kiayias, Cristopher Moore, Saad Quader, Alexander Russell
2017/240 (PDF ) Lattice-Based SNARGs and Their Application to More Efficient Obfuscation Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu
2017/239 (PDF ) Boosting Authenticated Encryption Robustness With Minimal Modifications Tomer Ashur, Orr Dunkelman, Atul Luykx
2017/238 (PDF ) Mixing Confidential Transactions: Comprehensive Transaction Privacy for Bitcoin Tim Ruffing, Pedro Moreno-Sanchez
2017/237 (PDF ) Switch Commitments: A Safety Switch for Confidential Transactions Tim Ruffing, Giulio Malavolta
2017/236 (PDF ) A new rank metric codes based encryption scheme Pierre Loidreau
2017/235 (PDF ) Efficient Oblivious Transfer from Lossy Threshold Homomorphic Encryption Isheeta Nargis
2017/234 (PDF ) Automatically Detecting Compromised Secrets: Foundations, Design Principles, and Applications Kevin Milner, Cas Cremers, Jiangshan Yu, Mark Ryan
2017/233 (PDF ) Simplifying Design and Analysis of Complex Predicate Encryption Schemes Shashank Agrawal, Melissa Chase
2017/232 (PDF ) TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake Alexander Chepurnoy, Tuyet Duong, Lei Fan, Hong-Sheng Zhou
2017/231 (PDF ) EHE: nonce misuse-resistant message authentication Sergey Agievich
2017/230 (PDF ) Smart Contracts Make Bitcoin Mining Pools Vulnerable Yaron Velner, Jason Teutsch, Loi Luu
2017/229 (PDF ) Multi-Prover Interactive Proofs: Unsound Foundations Claude Crépeau, Nan Yang
2017/228 (PDF ) Efficient and Secure Outsourcing of Genomic Data Storage João Sá Sousa, Cédric Lefebvre, Zhicong Huang, Jean Louis Raisaro, Carlos Aguilar, Marc-Olivier Killijian, Jean-Pierre Hubaux
2017/227 (PDF ) Towards Shared Ownership in the Cloud Hubert Ritzdorf, Claudio Soriente, Ghassan O. Karame, Srdjan Marinovic, Damian Gruber, Srdjan Capkun
2017/226 (PDF ) JIMU: Faster LEGO-based Secure Computation using Additive Homomorphic Hashes Ruiyu Zhu, Yan Huang
2017/225 (PDF ) Bandwidth Hard Functions for ASIC Resistance Ling Ren, Srinivas Devadas
2017/224 (PDF ) Simple Encrypted Arithmetic Library - SEAL v2.1 Hao Chen, Kim Laine, Rachel Player
2017/223 (PDF ) 0-RTT Key Exchange with Full Forward Secrecy Felix Günther, Britta Hale, Tibor Jager, Sebastian Lauer
2017/221 (PDF ) A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE Florian Göpfert, Christine van Vredendaal, Thomas Wunderer
2017/220 (PDF ) Cryptanalysis of PMACx, PMAC2x, and SIVx Kazuhiko Minematsu, Tetsu Iwata
2017/219 (PDF ) Attribute-Based Encryption from Identity-Based Encryption Chun-I Fan, Yi-Fan Tseng, Chih-Wen Lin
2017/218 (PDF ) Repeated Games for Generating Randomness in Encryption Kenji Yasunaga, Kosuke Yuzawa
2017/217 (PDF ) Cryptanalysis of Wang et al’s Certificateless Signature Scheme without Bilinear Pairings Kuo-Hui Yeh
2017/216 (PDF ) SCRAPE: Scalable Randomness Attested by Public Entities Ignacio Cascudo, Bernardo David
2017/214 (PDF ) Low Cost Constant Round MPC Combining BMR and Oblivious Transfer Carmit Hazay, Peter Scholl, Eduardo Soria-Vazquez
2017/213 (PDF ) Quantum Information Set Decoding Algorithms Ghazal Kachigar, Jean-Pierre Tillich
2017/212 (PDF ) Montgomery curves and their arithmetic: The case of large characteristic fields Craig Costello, Benjamin Smith
2017/211 (PDF ) Multi-level Access in Searchable Symmetric Encryption James Alderman, Keith M. Martin, Sarah Louise Renwick
2017/210 (PDF ) Public Key Cryptosystems with Noisy Secret Keys Charles Herder, Benjamin Fuller, Marten van Dijk, Srinivas Devadas
2017/209 (PDF ) Exploding Obfuscation: A Framework for Building Applications of Obfuscation From Polynomial Hardness Qipeng Liu, Mark Zhandry
2017/208 (PDF ) SoK: Security Models for Pseudo-Random Number Generators Sylvain Ruhault
2017/207 (PDF ) Private Queries on Encrypted Genomic Data Gizem S Cetin, Hao Chen, Kim Laine, Kristin Lauter, Peter Rindal, Yuhou Xia
2017/206 (PDF ) Quantum Resistant Public Key Encryption Scheme RLCE and IND-CCA2 Security for McEliece Schemes Yongge Wang
2017/205 (PDF ) ZETA: Towards Tagless Authenticated Encryption Anindya Shankar Bhandari, Dipanwita Roy Chowdhury
2017/204 (PDF ) Linear Cryptanalysis Using Low-bias Linear Approximations Tomer Ashur, Daniël Bodden, Orr Dunkelman
2017/203 (PDF ) Proofs of Useful Work Marshall Ball, Alon Rosen, Manuel Sabin, Prashant Nalini Vasudevan
2017/202 (PDF ) Average-Case Fine-Grained Hardness Marshall Ball, Alon Rosen, Manuel Sabin, Prashant Nalini Vasudevan
2017/201 (PDF ) Giving State to the Stateless: Augmenting Trustworthy Computation with Ledgers Gabriel Kaptchuk, Ian Miers, Matthew Green
2017/200 (PDF ) Anonymous Attestation with Subverted TPMs Jan Camenisch, Manu Drijvers, Anja Lehmann
2017/199 (PDF ) Improved Attacks for Characteristic-2 Parameters of the Cubic ABC Simple Matrix Encryption Scheme Dustin Moody, Ray Perlner, Daniel Smith-Tone
2017/198 (PDF ) FHE with Recursive Ciphertext Masahiro Yagisawa
2017/197 (PDF ) A Construction of Bent Functions with Optimal Algebraic Degree and Large Symmetric Group Wenying Zhang, Zhaohui Xing, Keqin Feng
2017/196 (PDF ) Attribute-based concurrent signatures BaoHong Li, Guoqing Xu, Yinliang Zhao
2017/195 (PDF ) Design of Lightweight Linear Diffusion Layers from Near-MDS Matrices Chaoyun Li, Qingju Wang
2017/194 (PDF ) Improved upper bounds for the expected circuit complexity of dense systems of linear equations over GF(2) Andrea Visconti, Chiara Valentina Schiavo, René Peralta
2017/193 (PDF ) SecChisel: Language and Tool for Practical and Scalable Security Verification of Security-Aware Hardware Architectures Shuwen Deng, Doğuhan Gümüşoğlu, Wenjie Xiong, Y. Serhan Gener, Onur Demir, Jakub Szefer
2017/191 (PDF ) CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks David Sommer, Aritra Dhar, Luka Malisa, Esfandiar Mohammadi, Daniel Ronzani, Srdjan Capkun
2017/190 (PDF ) The first collision for full SHA-1 Marc Stevens, Elie Bursztein, Pierre Karpman, Ange Albertini, Yarik Markov
2017/189 (PDF ) Global-Scale Secure Multiparty Computation Xiao Wang, Samuel Ranellucci, Jonathan Katz
2017/188 (PDF ) Division Cryptanalysis of Block Ciphers with a Binary Diffusion Layer Wenying Zhang, Vincent Rijmen
2017/187 (PDF ) The discrete logarithm problem over prime fields: the safe prime case. The Smart attack, non-canonical lifts and logarithmic derivatives H. Gopalakrishna Gadiyar, R. Padma
2017/186 (PDF ) A Post-Quantum Digital Signature Scheme Based on Supersingular Isogenies Youngho Yoo, Reza Azarderakhsh, Amir Jalali, David Jao, Vladimir Soukharev
2017/185 (PDF ) A Virtual Wiretap Channel for Secure MessageTransmission Setareh Sharifian, Reihaneh Safavi-Naini, Fuchun Lin
2017/184 (PDF ) Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models Guillaume Endignoux, Damian Vizár
2017/183 (PDF ) Analysis of Software Countermeasures for Whitebox Encryption Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Martin Bjerregaard Jepsen
2017/182 (PDF ) The Approximate $k$-List Problem Leif Both, Alexander May
2017/181 (PDF ) New techniques for trail bounds and application to differential trails in Keccak Silvia Mella, Joan Daemen, Gilles Van Assche
2017/180 (PDF ) Robust P2P Primitives Using SGX Enclaves Yaoqi Jia, Shruti Tople, Tarik Moataz, Deli Gong, Prateek Saxena, Zhenkai Liang
2017/179 (PDF ) REM: Resource-Efficient Mining for Blockchains Fan Zhang, Ittay Eyal, Robert Escriva, Ari Juels, Robbert van Renesse
2017/178 (PDF ) Optimal Differential Trails in SIMON-like Ciphers Zhengbin Liu, Yongqiang Li, Mingsheng Wang
2017/177 (PDF ) Some results on the existence of $t$-all-or-nothing transforms over arbitrary alphabets Navid Nasr Esfahani, Ian Goldberg, D. R. Stinson
2017/176 (PDF ) Probabilistically Checkable Proofs of Proximity with Zero-Knowledge Yuval Ishai, Mor Weiss
2017/175 (PDF ) Analysis of Burn-in period for RC4 State Transition Goutam Paul, Souvik Ray
2017/174 (PDF ) Cost-Aware Cut-and-Choose Games with Applications in Cryptography and Prefix-Free Codes Ruiyu Zhu, Yan Huang
2017/173 (PDF ) Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions Marc Stevens, Dan Shumow
2017/172 (PDF ) On The Exact Security of Message Authentication Using Pseudorandom Functions Ashwin Jha, Avradip Mandal, Mridul Nandi
2017/171 (PDF ) Quantum Key Search with Side Channel Advice Daniel P. Martin, Ashley Montanaro, Elisabeth Oswald, Dan Shepherd
2017/170 (PDF ) Error-free protection of EC point multiplication by modular extension Martin Seysen
2017/169 (PDF ) UFace: Your Universal Password That No One Can See Nicholas Hilbert, Christian Storer, Dan Lin, Wei Jiang
2017/168 (PDF ) AES-GCM-SIV: Specification and Analysis Shay Gueron, Adam Langley, Yehuda Lindell
2017/167 (PDF ) Cloud Storage File Recoverability Christian A. Gorke, Christian Janson, Frederik Armknecht, Carlos Cid
2017/166 (PDF ) A roadmap to fully homomorphic elections: Stronger security, better verifiability Kristian Gjøsteen, Martin Strand
2017/165 (PDF ) SymSum: Symmetric-Sum Distinguishers Against Round Reduced SHA3 Dhiman Saha, Sukhendu Kuila, Dipanwita Roy Chowdhury
2017/164 (PDF ) Conditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-bounds, and Separations Benny Applebaum, Barak Arkis, Pavel Raykov, Prashant Nalini Vasudevan
2017/163 (PDF ) Homomorphic Encryption without Gaussian Noise Anamaria Costache, Nigel P. Smart
2017/162 (PDF ) Analysis of AES, SKINNY, and Others with Constraint Programming Siwei Sun, David Gerault, Pascal Lafourcade, Qianqian Yang, Yosuke Todo, Kexin Qiao, Lei Hu
2017/161 (PDF ) Security Notions for Bidirectional Channels Giorgia Azzurra Marson, Bertram Poettering
2017/160 (PDF ) Conditional Cube Attack on Round-Reduced ASCON Zheng Li, Xiaoyang Dong, Xiaoyun Wang
2017/159 (PDF ) Cube-like Attack on Round-Reduced Initialization of Ketje Sr Xiaoyang Dong, Zheng Li, Xiaoyun Wang, Ling Qin
2017/158 (PDF ) Passphone: Outsourcing Phone-based Web Authentication while Protecting User Privacy Martin Potthast, Christian Forler, Eik List, Stefan Lucks
2017/157 (PDF ) Detecting General Algebraic Manipulation Attacks Kim Ramchen
2017/156 (PDF ) Trust Is Risk: A Decentralized Financial Trust Platform Orfeas Stefanos Thyfronitis Litos, Dionysis Zindros
2017/155 (PDF ) Random Sampling Revisited: Lattice Enumeration with Discrete Pruning Yoshinori Aono, Phong Q. Nguyen
2017/154 (PDF ) Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers Thorsten Kranz, Friedrich Wiemer, Gregor Leander
2017/153 (PDF ) Storage Efficient Substring Searchable Symmetric Encryption Iraklis Leontiadis, Ming Li
2017/152 (PDF ) Encryptor Combiners: A Unified Approach to Multiparty NIKE, (H)IBE, and Broadcast Encryption Fermi Ma, Mark Zhandry
2017/151 (PDF ) Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption Carmen Elisabetta Zaira Baltico, Dario Catalano, Dario Fiore, Romain Gay
2017/150 (PDF ) Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation Elette Boyle, Niv Gilboa, Yuval Ishai
2017/149 (PDF ) Bitcoin as a Transaction Ledger: A Composable Treatment Christian Badertscher, Ueli Maurer, Daniel Tschudi, Vassilis Zikas
2017/148 (PDF ) Pattern Matching on Encrypted Streams Nicolas Desmoulins, Pierre-Alain Fouque, Cristina Onete, Olivier Sanders
2017/147 (PDF ) Ad Hoc PSM Protocols: Secure Computation Without Coordination Amos Beimel, Yuval Ishai, Eyal Kushilevitz
2017/146 (PDF ) Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions Mohammad Hajiabadi, Bruce M. Kapron
2017/145 (PDF ) The Multi-User Security of Double Encryption Viet Tung Hoang, Stefano Tessaro
2017/144 (PDF ) Privacy-Preserving Search of Similar Patients in Genomic Data Gilad Asharov, Shai Halevi, Yehuda Lindell, Tal Rabin
2017/143 (PDF ) Constraint-hiding Constrained PRFs for NC1 from LWE Ran Canetti, Yilei Chen
2017/142 (PDF ) Computing generator in cyclotomic integer rings, A subfield algorithm for the Principal Ideal Problem in L(1/2) and application to cryptanalysis of a FHE scheme Jean-François Biasse, Thomas Espitau, Pierre-Alain Fouque, Alexandre Gélin, Paul Kirchner
2017/141 (PDF ) Partitioned Group Password-Based Authenticated Key Exchange Dario Fiore, Maria Isabel Gonzalez Vasco, Claudio Soriente
2017/140 (PDF ) Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples Nina Bindel, Johannes Buchmann, Florian Göpfert, Markus Schmidt
2017/139 (PDF ) Revisiting AES Related-Key Differential Attacks with Constraint Programming David Gérault, Pascal Lafourcade, Marine Minier, Christine Solnon
2017/138 (PDF ) How (not) to Use Welch's T-test in Side-Channel Security Evaluations François-Xavier Standaert
2017/137 (PDF ) Modifying an Enciphering Scheme after Deployment Paul Grubbs, Thomas Ristenpart, Yuval Yarom
2017/136 (PDF ) Dispersed Cryptography and the Quotient Ring Transform Anna Johnston
2017/135 (PDF ) Hashing Garbled Circuits for Free Xiong Fan, Chaya Ganesh, Vladimir Kolesnikov
2017/134 (PDF ) A Provably Secure PKCS\#11 Configuration Without Authenticated Attributes Ryan Stanley-Oakes
2017/133 (PDF ) Composable and Robust Outsourced Storage Christian Badertscher, Ueli Maurer
2017/132 (PDF ) Attacks on Karlsson and Mitrokotsa's Grouping-Proof-Distance-Bounding Protocol Roel Peeters, Jens Hermans, Aysajan Abidin
2017/131 (PDF ) A Practical Multivariate Blind Signature Scheme Albrecht Petzoldt, Alan Szepieniec, Mohamed Saied Emam Mohamed
2017/130 (PDF ) Topology-Hiding Computation Beyond Logarithmic Diameter Adi Akavia, Tal Moran
2017/129 (PDF ) Sublinear Zero-Knowledge Arguments for RAM Programs Payman Mohassel, Mike Rosulek, Alessandra Scafuro
2017/128 (PDF ) New Collision Attacks on Round-Reduced Keccak Kexin Qiao, Ling Song, Meicheng Liu, Jian Guo
2017/127 (PDF ) Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption Prabhanjan Ananth, Aayush Jain, Amit Sahai
2017/126 (PDF ) Boolean Searchable Symmetric Encryption with Worst-Case Sub-Linear Complexity Seny Kamara, Tarik Moataz
2017/125 (PDF ) Non-Interactive Secure 2PC in the Offline/Online and Batch Settings Payman Mohassel, Mike Rosulek
2017/124 (PDF ) On the Exact Round Complexity of Self-Composable Two-Party Computation Sanjam Garg, Susumu Kiyoshima, Omkant Pandey
2017/123 (PDF ) Separating IND-CPA and Circular Security for Unbounded Length Key Cycles Rishab Goyal, Venkata Koppula, Brent Waters
2017/122 (PDF ) One-Shot Verifiable Encryption from Lattices Vadim Lyubashevsky, Gregory Neven
2017/121 (PDF ) Twisted $\mu_4$-normal form for elliptic curves David Kohel
2017/120 (PDF ) Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption Rishab Goyal, Venkata Koppula, Brent Waters
2017/119 (PDF ) Quantum Authentication with Key Recycling Christopher Portmann
2017/118 (PDF ) A New Structural-Differential Property of 5-Round AES Lorenzo Grassi, Christian Rechberger, Sondre Rønjom
2017/117 (PDF ) The SM9 Cryptographic Schemes Zhaohui Cheng
2017/116 (PDF ) Masking Proofs are Tight (and How to Exploit it in Security Evaluations) Vincent Grosso, François-Xavier Standaert
2017/115 (PDF ) An efficient self-blindable attribute-based credential scheme Sietse Ringers, Eric Verheul, Jaap-Henk Hoepman
2017/114 (PDF ) Zero-Knowledge Proofs of Proximity Itay Berman, Ron D. Rothblum, Vinod Vaikuntanathan
2017/113 (PDF ) Algebraic Fault Analysis of SHA-3 Pei Luo, Konstantinos Athanasiou, Yunsi Fei, Thomas Wahl
2017/112 (PDF ) Zero-Knowledge Proxy Re-Identification Revisited Xavier Bultel, Pascal Lafourcade
2017/111 (PDF ) EC-OPRF: Oblivious Pseudorandom Functions using Elliptic Curves Jonathan Burns, Daniel Moore, Katrina Ray, Ryan Speers, Brian Vohaska
2017/110 (PDF ) A Smart Contract for Boardroom Voting with Maximum Voter Privacy Patrick McCorry, Siamak F. Shahandashti, Feng Hao
2017/109 (PDF ) Unilaterally-Authenticated Key Exchange Yevgeniy Dodis, Dario Fiore
2017/108 (PDF ) Photonic Side Channel Attacks Against RSA Elad Carmon, Jean-Pierre Seifert, Avishai Wool
2017/107 (PDF ) Secure Logging with Crash Tolerance Erik-Oliver Blass, Guevara Noubir
2017/106 (PDF ) $\mu$chain: How to Forget without Hard Forks Ivan Puddu, Alexandra Dmitrienko, Srdjan Capkun
2017/105 (PDF ) A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem Ling Yang, Fuyang Fang, Xianhui Lu, Wen-Tao Zhu, Qiongxiao Wang, Shen Yan, Shiran Pan
2017/104 (PDF ) Implementing BP-Obfuscation Using Graph-Induced Encoding Shai Halevi, Tzipora Halevi, Victor Shoup, Noah Stephens-Davidowitz
2017/103 (PDF ) Reconciling d+1 Masking in Hardware and Software Hannes Gross, Stefan Mangard
2017/102 (PDF ) Quantum Authentication and Encryption with Key Recycling Serge Fehr, Louis Salvail
2017/101 (PDF ) Optimizing Implementations of Lightweight Building Blocks Jeremy Jean, Thomas Peyrin, Siang Meng Sim, Jade Tourteaux
2017/100 (PDF ) Private Puncturable PRFs From Standard Lattice Assumptions Dan Boneh, Sam Kim, Hart Montgomery
2017/099 (PDF ) Making NSEC5 Practical for DNSSEC Dimitrios Papadopoulos, Duane Wessels, Shumon Huque, Moni Naor, Jan Včelák, Leonid Reyzin, Sharon Goldberg
2017/098 (PDF ) Designing Fully Secure Protocols for Secure Two-Party Computation of Constant-Domain Functions Vanesa Daza, Nikolaos Makriyannis
2017/097 (PDF ) Boolean functions with restricted input and their robustness; application to the FLIP cipher Claude Carlet, Pierrick Méaux, Yann Rotella
2017/096 (PDF ) Asymptotically Compact Adaptively Secure Lattice IBEs and Verifiable Random Functions via Generalized Partitioning Techniques Shota Yamada
2017/095 (PDF ) Attacks on Secure Logging Schemes Gunnar Hartung
2017/094 (PDF ) Quantum Tokens for Digital Signatures Shalev Ben-David, Or Sattath
2017/093 (PDF ) On new multivariate cryptosystems based on hidden Eulerian equations over finite fields Vasyl Ustimenko
2017/092 (PDF ) Small CRT-Exponent RSA Revisited Atsushi Takayasu, Yao Lu, Liqiang Peng
2017/091 (PDF ) Design and Implementation of Low Depth Pairing-based Homomorphic Encryption Scheme Vincent Herbert, Bhaskar Biswas, Caroline Fontaine
2017/090 (PDF ) Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud Saiyu Qi, Yuanqing Zheng
2017/089 (PDF ) On a Linear Cryptanalysis of a Family of Modified DES Ciphers with Even Weight S-boxes Yuri Borissov, Peter Boyvalenkov, Robert Tsenkov
2017/088 (PDF ) A Differential Fault Attack on Plantlet Subhamoy Maitra, Akhilesh Siddhanti
2017/087 (PDF ) Cryptanalysis of full round Fruit Sabyasachi Dey, Santanu Sarkar
2017/086 (PDF ) Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation David Derler, Sebastian Ramacher, Daniel Slamanig
2017/085 (PDF ) Information Security Applications of Bit-Mixers Laszlo Hars
2017/084 (PDF ) Hardware Bit-Mixers Laszlo Hars
2017/083 (PDF ) Shor's Algorithm and Factoring: Don't Throw Away the Odd Orders Anna Johnston
2017/082 (PDF ) Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates Marc Fischlin, Felix Günther
2017/081 (PDF ) Estonian Voting Verification Mechanism Revisited Again Ivo Kubjas, Tiit Pikma, Jan Willemson
2017/080 (PDF ) From Minicrypt to Obfustopia via Private-Key Functional Encryption Ilan Komargodski, Gil Segev
2017/079 (PDF ) Faster Bootstrapping of FHE over the Integers Jung Hee Cheon, Kyoohyung Han, Duhyeong Kim
2017/078 (PDF ) LPN Decoded Andre Esser, Robert Kübler, Alexander May
2017/077 (PDF ) Quantum algorithms for computing short discrete logarithms and factoring RSA integers Martin Ekerå, Johan Håstad
2017/076 (PDF ) DFA on LS-Designs with a Practical Implementation on SCREAM (extended version) Benjamin Lac, Anne Canteaut, Jacques Fournier, Renaud Sirdey
2017/075 (PDF ) A First DFA on PRIDE: from Theory to Practice (extended version) Benjamin Lac, Marc Beunardeau, Anne Canteaut, Jacques Fournier, Renaud Sirdey
2017/074 (PDF ) Honey Chatting: A novel instant messaging system robust to eavesdropping over communication Joo-Im Kim, Ji Won Yoon
2017/073 (PDF ) Visual Honey Encryption: Application to Steganography Ji Won Yoon, Hyoungshick Kim, Hyun-Ju Jo, Hyelim Lee, Kwangsu Lee
2017/072 (PDF ) How to Circumvent the Two-Ciphertext Lower Bound for Linear Garbling Schemes Carmen Kempka, Ryo Kikuchi, Koutarou Suzuki
2017/071 (PDF ) Efficient Differential Trail Searching Algorithm for ARX Block Ciphers Seojin Kim, HyungChul Kang, Deukjo Hong, Jaechul Sung, Seokhie Hong
2017/070 (PDF ) Symbolic Models for Isolated Execution Environments Charlie Jacomme, Steve Kremer, Guillaume Scerri
2017/069 (PDF ) The Exact Security of PMAC Peter Gaži, Krzysztof Pietrzak, Michal Rybár
2017/068 (PDF ) Authenticated Encryption in the Face of Protocol and Side Channel Leakage Guy Barwell, Daniel P. Martin, Elisabeth Oswald, Martijn Stam
2017/067 (PDF ) Computation of a 768-bit prime field discrete logarithm Thorsten Kleinjung, Claus Diem, Arjen K. Lenstra, Christine Priplata, Colin Stahlke
2017/066 (PDF ) Subring Homomorphic Encryption Seiko Arita, Sari Handa
2017/065 (PDF ) FHE Over the Integers: Decomposed and Batched in the Post-Quantum Regime Daniel Benarroch, Zvika Brakerski, Tancrède Lepoint
2017/064 (PDF ) Fast Montgomery-like Square Root Computation over $GF(2^m)$ for All Trinomials Yin Li, Yu Zhang
2017/063 (PDF ) Optimal Extension Protocols for Byzantine Broadcast and Agreement Chaya Ganesh, Arpita Patra
2017/062 (PDF ) Efficient Maliciously Secure Two Party Computation for Mixed Programs Arash Afshar, Payman Mohassel, Mike Rosulek
2017/061 (PDF ) Short Digital Signatures and ID-KEMs via Truncation Collision Resistance Tibor Jager, Rafael Kurek
2017/060 (PDF ) Zero Round-Trip Time for the Extended Access Control Protocol Jacqueline Brendel, Marc Fischlin
2017/059 (PDF ) Adaptively Secure Recipient Revocable Broadcast Encryption with Constant size Ciphertext Kamalesh Acharya, Ratna Dutta
2017/058 (PDF ) WalnutDSA(TM): A Quantum-Resistant Digital Signature Algorithm Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E Gunnells
2017/057 (PDF ) Single--Trace Template Attack on the DES Round Keys of a Recent Smart Card Mathias Wagner, Stefan Heyse
2017/056 (PDF ) Verifiable Classroom Voting in Practice Feng Hao, Dylan Clarke, Brian Randell, Siamak F. Shahandashti
2017/055 (PDF ) A Probabilistic Baby-Step Giant-Step Algorithm Prabhat Kushwaha, Ayan Mahalanobis
2017/054 (PDF ) Attribute-Based Encryption Implies Identity-Based Encryption Javier Herranz
2017/053 (PDF ) Horizontal isogeny graphs of ordinary abelian varieties and the discrete logarithm problem Dimitar Jetchev, Benjamin Wesolowski
2017/052 (PDF ) A short note on the security of Round-Robin Differential Phase-Shift QKD Boris Skoric
2017/051 (PDF ) A note on VRFs from Verifiable Functional Encryption Saikrishna Badrinarayanan, Vipul Goyal, Aayush Jain, Amit Sahai
2017/050 (PDF ) An Obfuscating Compiler Peter T. Breuer
2017/049 (PDF ) LARA - A Design Concept for Lattice-based Encryption El Bansarkhani Rachid
2017/048 (PDF ) ROTE: Rollback Protection for Trusted Execution Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, Arthur Gervais, Ari Juels, Srdjan Capkun
2017/047 (PDF ) On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL Martin R. Albrecht
2017/046 (PDF ) Practical Passive Leakage-Abuse Attacks Against Symmetric Searchable Encryption Matthieu Giraud, Alexandre Anzala-Yamajako, Olivier Bernard, Pascal Lafourcade
2017/045 (PDF ) Efficient Round-Optimal Blind Signatures in the Standard Model Essam Ghadafi
2017/044 (PDF ) Anonymous contribution of data Matthew McKague, David Eyers
2017/043 (PDF ) Accumulators with Applications to Anonymity-Preserving Revocation Foteini Baldimtsi, Jan Camenisch, Maria Dubovitskaya, Anna Lysyanskaya, Leonid Reyzin, Kai Samelin, Sophia Yakoubov
2017/042 (PDF ) Indifferentiability of Iterated Even-Mansour Ciphers with Non-Idealized Key-Schedules: Five Rounds are Necessary and Sufficient Yuanxi Dai, Yannick Seurin, John Steinberger, Aishwarya Thiruvengadam
2017/041 (PDF ) Reducing Garbled Circuit Size While Preserving Circuit Gate Privacy Yongge Wang, Qutaibah m. Malluhi
2017/040 (PDF ) Practical Non-Malleable Codes from $\ell$-more Extractable Hash Functions Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis
2017/039 (PDF ) SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision (Full Version) Iraklis Symeonidis, Abdelrahaman Aly, Mustafa A. Mustafa, Bart Mennink, Siemen Dhooghe, Bart Preneel
2017/038 (PDF ) CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions Fabrice Benhamouda, Florian Bourse, Helger Lipmaa
2017/037 (PDF ) Double-base scalar multiplication revisited Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange
2017/036 (PDF ) Low-Complexity Cryptographic Hash Functions Benny Applebaum, Naama Haramaty, Yuval Ishai, Eyal Kushilevitz, Vinod Vaikuntanathan
2017/035 (PDF ) Privacy-Preserving Classification on Deep Neural Network Hervé Chabanne, Amaury de Wargny, Jonathan Milgram, Constance Morel, Emmanuel Prouff
2017/034 (PDF ) Analysis of the NORX Core Permutation Alex Biryukov, Aleksei Udovenko, Vesselin Velichkov
2017/033 (PDF ) Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures Peter Pessl
2017/032 (PDF ) Cryptanalysis of GlobalPlatform Secure Channel Protocols Mohamed Sabt, Jacques Traoré
2017/031 (PDF ) Honey Encryption for Language Marc Beunardeau, Houda Ferradi, Rémi Géraud, David Naccache
2017/030 (PDF ) Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation Xiao Wang, Samuel Ranellucci, Jonathan Katz
2017/029 (PDF ) Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions Gene Itkis, Emily Shen, Mayank Varia, David Wilson, Arkady Yerukhimovich
2017/027 (PDF ) Scalable Multi-Party Private Set-Intersection Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
2017/026 (PDF ) Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model Carmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam
2017/025 (PDF ) Improved Structure Preserving Signatures under Standard Bilinear Assumptions Charanjit S. Jutla, Arnab Roy
2017/024 (PDF ) Searchable Encrypted Relational Databases: Risks and Countermeasures Mohamed Ahmed Abdelraheem, Tobias Andersson, Christian Gehrmann
2017/023 (PDF ) Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits Nuttapong Attrapadung
2017/022 (PDF ) Privacy for Distributed Databases via (Un)linkable Pseudonyms Jan Camenisch, Anja Lehmann
2017/021 (PDF ) A Generic Approach to Constructing and Proving Verifiable Random Functions Rishab Goyal, Susan Hohenberger, Venkata Koppula, Brent Waters
2017/020 (PDF ) concerto: A Methodology Towards Reproducible Analyses of TLS Datasets Olivier Levillain, Maxence Tury, Nicolas Vivet
2017/019 (PDF ) SmartPool: Practical Decentralized Pooled Mining Loi Luu, Yaron Velner, Jason Teutsch, Prateek Saxena
2017/018 (PDF ) Verifiable Random Functions from Non-Interactive Witness-Indistinguishable Proofs Nir Bitansky
2017/017 (PDF ) Improved Algorithms for the Approximate k-List Problem in Euclidean Norm Gottfried Herold, Elena Kirshanova
2017/016 (PDF ) Provable Security of Substitution-Permutation Networks Yevgeniy Dodis, Jonathan Katz, John Steinberger, Aishwarya Thiruvengadam, Zhe Zhang
2017/015 (PDF ) Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-Malleable Codes Dana Dachman-Soled, Mukul Kulkarni, Aria Shahverdi
2017/014 (PDF ) ORAMs in a Quantum World Tommaso Gagliardoni, Nikolaos P. Karvelas, Stefan Katzenbeisser
2017/013 (PDF ) Pinocchio-Based Adaptive zk-SNARKs and Secure/Correct Adaptive Function Evaluation Meilof Veeningen
2017/012 (PDF ) Universal Samplers with Fast Verification Venkata Koppula, Andrew Poelstra, Brent Waters
2017/011 (PDF ) Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
2017/010 (PDF ) Circuit-Private Multi-Key FHE Wutichai Chongchitmate, Rafail Ostrovsky
2017/009 (PDF ) Access Control Encryption for Equality, Comparison, and More Georg Fuchsbauer, Romain Gay, Lucas Kowalczyk, Claudio Orlandi
2017/008 (PDF ) Externally Verifiable Oblivious RAM Joshua Gancher, Adam Groce, Alex Ledger
2017/007 (PDF ) Algebraic Attack Efficiency versus S-box Representation Hossein Arabnezhad-Khanoki, Babak Sadeghiyan, Josef Pieprzyk
2017/006 (PDF ) Reduced Mumford divisors of a genus 2 curve through its jacobian function field Eduardo Ruiz Duarte
2017/004 (PDF ) A New Approach for Practical Function-Private Inner Product Encryption Sungwook Kim, Jinsu Kim, Jae Hong Seo
2017/003 (PDF ) The STROBE protocol framework Mike Hamburg
2017/001 (PDF ) Equivalences and Black-Box Separations of Matrix Diffie-Hellman Problems Jorge Luis Villar
[ Cryptology ePrint archive ]